Sample records for identity management system

  1. Achieving Privacy in a Federated Identity Management System

    NASA Astrophysics Data System (ADS)

    Landau, Susan; Le van Gong, Hubert; Wilton, Robin

    Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domains blurs security boundaries and potentially creates privacy risks. We examine privacy risks and fundamental privacy protections of federated identity- management systems. The protections include minimal disclosure and providing PII only on a “need-to-know” basis. We then look at the Liberty Alliance system and analyze previous privacy critiques of that system. We show how law and policy provide privacy protections in federated identity-management systems, and that privacy threats are best handled using a combination of technology and law/policy tools.

  2. Identity and Access Management and Security in Higher Education.

    ERIC Educational Resources Information Center

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  3. Responses to professional identity threat: Identity management strategies in incident narratives of health care professionals.

    PubMed

    van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter

    2015-01-01

    The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.

  4. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    PubMed

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  5. A Contextual Model for Identity Management (IdM) Interfaces

    ERIC Educational Resources Information Center

    Fuller, Nathaniel J.

    2014-01-01

    The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…

  6. Biometric identity management for standard mobile medical networks.

    PubMed

    Egner, Alexandru; Soceanu, Alexandru; Moldoveanu, Florica

    2012-01-01

    The explosion of healthcare costs over the last decade has prompted the ICT industry to respond with solutions for reducing costs while improving healthcare quality. The ISO/IEEE 11073 family of standards recently released is the first step towards interoperability of mobile medical devices used in patient environments. The standards do not, however, tackle security problems, such as identity management, or the secure exchange of medical data. This paper proposes an enhancement of the ISO/IEEE 11073-20601 protocol with an identity management system based on biometry. The paper describes a novel biometric-based authentication process, together with the biometric key generation algorithm. The proposed extension of the ISO/IEEE 11073-20601 is also presented.

  7. Research Management in Portugal: A Quest for Professional Identity

    ERIC Educational Resources Information Center

    Trindade, Margarida; Agostinho, Marta

    2014-01-01

    Research managers at science-intensive institutions appear as a continuously evolving group of professionals whose identity is somewhat fragmented, even to themselves. In Portugal, specialized research manager roles have rapidly emerged over the last years alongside the development of a small but consolidated scientific system. In order to get an…

  8. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    PubMed Central

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  9. Social identity management strategies used by workers with acquired hearing loss.

    PubMed

    Jennings, Mary Beth; Southall, Kenneth; Gagné, Jean-Pierre

    2013-01-01

    There is a paucity of knowledge about social identity-management by persons with hearing loss. The objective of the study was to gain an understanding from the perspective of the participants, the ways in which workers with acquired hearing loss manage their identity in the workplace. Twelve persons with acquired hearing loss, who were gainfully employed in a variety of settings and occupations in three Canadian cities, participated in audio-recorded semi-structured interviews. A secondary qualitative analysis was conducted on transcripts of interviews collected in a previous study on factors that influence disclosure of hearing loss in the workplace. A qualitative descriptive research paradigm was adopted and content analyses were used to extract pertinent information from verbatim transcripts. Participants described a range of identity-management strategies enacted in the workplace. Five recurrent themes emerged as important considerations in the Art of Identity Management in the workplace: 1. Managing the situation, 2. Having a buddy system, 3. Feeling comfortable, 4. Using personal resources, 5. It gets easier with time. Social identity-management is a complex process. Although persons with acquired hearing loss experience different challenges from other persons with invisible stigmas, similarities in the range of social identity-management strategies employed were evident in our findings. In addition, the social cognitive learning model of disclosure appears to be relevant to the experiences of our participants. The implications of the findings emphasize the importance of all stakeholders working collaboratively to address the issues of the growing population of workers with hearing loss.

  10. Playing It Safe: Identity Management and Single Sign-On

    ERIC Educational Resources Information Center

    Alawneh, John

    2012-01-01

    Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…

  11. CILogon: An Integrated Identity and Access Management Platform for Science

    NASA Astrophysics Data System (ADS)

    Basney, J.

    2016-12-01

    When scientists work together, they use web sites and other software to share their ideas and data. To ensure the integrity of their work, these systems require the scientists to log in and verify that they are part of the team working on a particular science problem. Too often, the identity and access verification process is a stumbling block for the scientists. Scientific research projects are forced to invest time and effort into developing and supporting Identity and Access Management (IAM) services, distracting them from the core goals of their research collaboration. CILogon provides an IAM platform that enables scientists to work together to meet their IAM needs more effectively so they can allocate more time and effort to their core mission of scientific research. The CILogon platform enables federated identity management and collaborative organization management. Federated identity management enables researchers to use their home organization identities to access cyberinfrastructure, rather than requiring yet another username and password to log on. Collaborative organization management enables research projects to define user groups for authorization to collaboration platforms (e.g., wikis, mailing lists, and domain applications). CILogon's IAM platform serves the unique needs of research collaborations, namely the need to dynamically form collaboration groups across organizations and countries, sharing access to data, instruments, compute clusters, and other resources to enable scientific discovery. CILogon provides a software-as-a-service platform to ease integration with cyberinfrastructure, while making all software components publicly available under open source licenses to enable re-use. Figure 1 illustrates the components and interfaces of this platform. CILogon has been operational since 2010 and has been used by over 7,000 researchers from more than 170 identity providers to access cyberinfrastructure including Globus, LIGO, Open Science Grid

  12. Improving Measurement of Workplace Sexual Identity Management

    ERIC Educational Resources Information Center

    Lance, Teresa S.; Anderson, Mary Z.; Croteau, James M.

    2010-01-01

    The purpose of this study was to advance measurement of sexual identity management for lesbian, gay, and bisexual workers. Psychometric properties of a revised version of the Workplace Sexual Identity Management Measure (WSIMM; Anderson, Croteau, Chung, & DiStefano, 2001) were examined on a sample of 64 predominantly White K-12 teachers.…

  13. Identity Management Systems in Healthcare: The Issue of Patient Identifiers

    NASA Astrophysics Data System (ADS)

    Soenens, Els

    According to a recent recommendation of the European Commission, now is the time for Europe to enhance interoperability in eHealth. Although interoperability of patient identifiers seems promising for matters of patient mobility, patient empowerment and effective access to care, we see that today there is indeed a considerable lack of interoperability in the field of patient identification. Looking from a socio-technical rather than a merely technical point of view, one can understand the fact that the development and implementation of an identity management system in a specific healthcare context is influenced by particular social practices, affected by socio-economical history and the political climate and regulated by specific data protection legislations. Consequently, the process of making patient identification in Europe more interoperable is a development beyond semantic and syntactic levels. In this paper, we gives some examples of today’s patient identifier systems in Europe, discuss the issue of interoperability of (unique) patient identifiers from a socio-technical point of view and try not to ignore the ‘privacy side’ of the story.

  14. Identity and Access Management: Technological Implementation of Policy

    ERIC Educational Resources Information Center

    von Munkwitz-Smith, Jeff; West, Ann

    2004-01-01

    Navigating the multiple processes for accessing ever-multiplying campus information systems can be a daunting task for students, faculty, and staff. This article provides a brief overview of Identity and Access Management Services. The authors review key characteristics and components of this new information architecture and address the issue of…

  15. Does identity shape leadership and management practice? Experiences of PHC facility managers in Cape Town, South Africa

    PubMed Central

    Daire, Judith; Gilson, Lucy

    2014-01-01

    In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager’s job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better

  16. Does identity shape leadership and management practice? Experiences of PHC facility managers in Cape Town, South Africa.

    PubMed

    Daire, Judith; Gilson, Lucy

    2014-09-01

    In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager's job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better

  17. Campus Single Sign-On und hochschulübergreifendes Identity Management

    NASA Astrophysics Data System (ADS)

    Hommel, Wolfgang

    Das im Rahmen von IntegraTUM für die TUM geschaffene Identity & Access Management System setzt das Paradigma unified login um, d. h. ein Benutzer kann alle für ihn relevanten Dienste innerhalb der Hochschule mit derselben Loginname-/Passwortkombination nutzen. Dieser Artikel zeigt, wie auf Basis der Software Shibboleth und der deutschlandweiten Hochschulföderation DFN-AAI als weitere Mehrwerte das campusweite web single sign-on und die nahtlose Nutzung zahlreicher externer Web-Anwendungen erreicht werden. Als Beispiel für die Abläufe bei der Erschließung neuer Dienste für die hochschulübergreifende Nutzung wird die Anbindung von Learning Management Systemen auf Basis des DFN-AAI E-Learning-Profils diskutiert. Den umfassenden Vorteilen werden schließlich die aktuellen technischen Grenzen bei der Umsetzung des hochschulübergreifenden Identity Management gegenübergestellt.

  18. Building an Identity Management Governance Process

    ERIC Educational Resources Information Center

    Berg, Joanne E.; Kraemer, Ron; Raatz, Carla; Devoti, Steve

    2009-01-01

    A particular challenge in any campus environment is determining how requests for access to services and resources are managed. Who decides the technology, infrastructure, policy, business process and procedure? The involvement of key institutional leaders and stakeholders in identity management governance is the driving force behind the way the…

  19. Working to reduce the effects of discrimination: Identity management strategies in organizations.

    PubMed

    Shih, Margaret; Young, Maia J; Bucher, Amy

    2013-04-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity redefinition (i.e., stereotype reassociation and regeneration). Organizations adopting a color-blind approach may make it more difficult for individuals to use identity switching because the policies deemphasize differences in social identities. In contrast, organizations adopting a multicultural approach may make it more difficult for individuals to use identity redefinition. Multicultural approaches, applied superficially, may celebrate group differences that might actually reinforce culturally dominant stereotypes. We explore the likelihood that individuals will adopt each strategy given these organizational approaches to diversity. We outline steps organizations can take to reduce the need for identity management strategies and to facilitate identity management when necessary.

  20. A Federated Digital Identity Management Approach for Business Processes

    NASA Astrophysics Data System (ADS)

    Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.

    Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.

  1. 6 Keys to Identity Management

    ERIC Educational Resources Information Center

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  2. Integrating Identity Management With Federated Healthcare Data Models

    NASA Astrophysics Data System (ADS)

    Hu, Jun; Peyton, Liam

    In order to manage performance and provide integrated services, health care data needs to be linked and aggregated across data sources from different organizations. The Internet and secure B2B networks offer the possibility of providing near real-time integration. However, there are three major stumbling blocks. One is to standardize and agree upon a common data model across organizations. The second is to match identities between different locations in order to link and aggregate records. The third is to protect identity and ensure compliance with privacy laws. In this paper, we analyze three main approaches to the problem and use a healthcare scenario to illustrate how each one addresses different aspects of the problem while failing to address others. We then present a systematic framework in which the different approaches can be flexibly combined for a more comprehensive approach to integrate identity management with federated healthcare data models.

  3. Patient Privacy, Consent, and Identity Management in Health Information Exchange: Issues for the Military Health System.

    PubMed

    Hosek, Susan D; Straus, Susan G

    2013-01-01

    The Military Health System (MHS) and the Veterans Health Administration (VHA) have been among the nation's leaders in health information technology (IT), including the development of health IT systems and electronic health records that summarize patients' care from multiple providers. Health IT interoperability within MHS and across MHS partners, including VHA, is one of ten goals in the current MHS Strategic Plan. As a step toward achieving improved interoperability, the MHS is seeking to develop a research roadmap to better coordinate health IT research efforts, address IT capability gaps, and reduce programmatic risk for its enterprise projects. This article contributes to that effort by identifying gaps in research, policy, and practice involving patient privacy, consent, and identity management that need to be addressed to bring about improved quality and efficiency of care through health information exchange. Major challenges include (1) designing a meaningful patient consent procedure, (2) recording patients' consent preferences and designing procedures to implement restrictions on disclosures of protected health information, and (3) advancing knowledge regarding the best technical approaches to performing patient identity matches and how best to monitor results over time. Using a sociotechnical framework, this article suggests steps for overcoming these challenges and topics for future research.

  4. Strategies for managing impressions of racial identity in the workplace.

    PubMed

    Roberts, Laura Morgan; Cha, Sandra E; Kim, Sung Soo

    2014-10-01

    This article deepens understanding of the workplace experiences of racial minorities by investigating racial identity-based impression management (RIM) by Asian American journalists. Racial centrality, directly or indirectly, predicted the use of 4 RIM strategies (avoidance, enhancement, affiliation, and racial humor). Professional centrality also predicted strategy use, which was related to life satisfaction and perceived career success. By shedding light on proactive strategies that individuals use to influence colleagues' impressions of their racial identity, we contribute to research on diversity in organizations, impression management, and racial identity. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  5. [Meanings attributed to management as an explanation for clinician managers' attitudes and professional identity].

    PubMed

    Cascón-Pereira, Rosalía; Valverde, Mireia

    2014-01-01

    To understand the process by which clinician managers construct their professional identities and develop their attitudes toward managing. A qualitative study was performed, based on grounded theory, through in-depth interviews with 20 clinician managers selected through theoretical sampling in two public hospitals of Catalonia (Spain), participant observation, and documentation. Clinician managers' role meanings are constructed by comparing their roles with those of senior managers and clinicians. In this process, clinician managers seek to differentiate themselves from senior managers through the meanings constructed. In particular, they use proximity with reality and clinical knowledge as the main sources of differentiation. This study sheds light on why clinician managers develop adverse attitudes to managing and why they define themselves as clinicians rather than as managers. The explanation lies in the construction of the meanings they assign to managing as the basis of their attitudes to this role and professional identity. These findings have some practical implications for healthcare management. Copyright © 2014. Published by Elsevier Espana.

  6. Globus Identity, Access, and Data Management: Platform Services for Collaborative Science

    NASA Astrophysics Data System (ADS)

    Ananthakrishnan, R.; Foster, I.; Wagner, R.

    2016-12-01

    Globus is software-as-a-service for research data management, developed at, and operated by, the University of Chicago. Globus, accessible at www.globus.org, provides high speed, secure file transfer; file sharing directly from existing storage systems; and data publication to institutional repositories. 40,000 registered users have used Globus to transfer tens of billions of files totaling hundreds of petabytes between more than 10,000 storage systems within campuses and national laboratories in the US and internationally. Web, command line, and REST interfaces support both interactive use and integration into applications and infrastructures. An important component of the Globus system is its foundational identity and access management (IAM) platform service, Globus Auth. Both Globus research data management and other applications use Globus Auth for brokering authentication and authorization interactions between end-users, identity providers, resource servers (services), and a range of clients, including web, mobile, and desktop applications, and other services. Compliant with important standards such as OAuth, OpenID, and SAML, Globus Auth provides mechanisms required for an extensible, integrated ecosystem of services and clients for the research and education community. It underpins projects such as the US National Science Foundation's XSEDE system, NCAR's Research Data Archive, and the DOE Systems Biology Knowledge Base. Current work is extending Globus services to be compliant with FEDRAMP standards for security assessment, authorization, and monitoring for cloud services. We will present Globus IAM solutions and give examples of Globus use in various projects for federated access to resources. We will also describe how Globus Auth and Globus research data management capabilities enable rapid development and low-cost operations of secure data sharing platforms that leverage Globus services and integrate them with local policy and security.

  7. Social work management in emerging health care systems.

    PubMed

    Kenney, J J

    1990-02-01

    An overview of the health care industry's trend toward multihealth systems is presented and specific adaptive strategies for social work managers in health care are suggested. The challenges to social work leaders during this transition from largely free-standing, privately owned health care institutions to corporately owned, horizontally and vertically integrated delivery systems are discussed in terms of identity, style, and substance. Directors of social work departments in multihealth corporations will need to resolve issues of institutional versus corporate identity as well as those of corporate versus professional identity. A multioptional management style that incorporates networking and political expertise should be cultivated. Substantive demands in the areas of management information systems, productivity, quality assurance, and budgeting also must be addressed. The emergence of multihealth systems poses major challenges and unique opportunities to the social work profession. Awareness of managerial strategies and critical content areas can help social work leaders enhance the role and contribution of social work in these exciting and complex health care delivery systems.

  8. Developing an Assessment of Sexual Identity Management for Lesbian and Gay Workers.

    ERIC Educational Resources Information Center

    Anderson, Mary Z.; Croteau, James M.; DiStefano, Teresa M.; Chung, Y. Barry

    2001-01-01

    Psychometric properties of the Workplace Sexual Identity Management Measure were tested with 172 professionals. Results suggest it successfully assesses a continuum of lesbian and gay identity management strategies (passing, covering, implicitly out, explicitly out). (Contains 27 references.) (SK)

  9. British-Pakistani women's perspectives of diabetes self-management: the role of identity.

    PubMed

    Majeed-Ariss, Rabiya; Jackson, Cath; Knapp, Peter; Cheater, Francine M

    2015-09-01

    To explore the effects of type 2 diabetes on British-Pakistani women's identity and its relationship with self-management. Type 2 diabetes is more prevalent and has worse outcomes among some ethnic minority groups. This may be due to poorer self-management and an inadequate match of health services to patient needs. The influence that type 2 diabetes has on British-Pakistani women's identity and subsequent self-management has received limited attention. An explorative qualitative study. Face-to-face semi-structured English and Urdu language interviews were conducted with a purposively selected heterogeneous sample of 15 British-Pakistani women with type 2 diabetes. Transcripts were analysed thematically. Four themes emerged: Perceived change in self emphasised how British-Pakistani women underwent a conscious adaptation of identity following diagnosis; Familiarity with ill health reflected women's adjustment to their changed identity over time; Diagnosis improves social support enabled women to accept changes within themselves and Supporting family is a barrier to self-management demonstrated how family roles were an aspect of women's identities that was resilient to change. The over-arching theme Role re-alignment enables successful self-management encapsulated how self-management was a continuous process where achievements needed to be sustained. Inter-generational differences were also noted: first generation women talked about challenges associated with ageing and co-morbidities; second generation women talked about familial and work roles competing with self-management. The complex nature of British-Pakistani women's self-identification requires consideration when planning and delivering healthcare. Culturally competent practice should recognise how generational status influences self-identity and diabetes self-management in ethnically diverse women. Health professionals should remain mindful of effective self-management occurring alongside, and being

  10. Working to Reduce the Effects of Discrimination: Identity Management Strategies in Organizations

    ERIC Educational Resources Information Center

    Shih, Margaret; Young, Maia J.; Bucher, Amy

    2013-01-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity…

  11. Searching for Extended Identity: The Problematised Role of Managing People Development, as Illuminated by the Frontline Management Initiative.

    ERIC Educational Resources Information Center

    Barratt-Pugh, Llandis

    Australia's Frontline Management Initiative (FMI) marks a political move toward workplace learning and provides evidence concerning development of managing identities and management of such workplace learning. The FMI was examined as a technology of identity within the discourse of enterprise and an instrument of textualization of the workplace.…

  12. The Formation of Professional Identity in French "Apprenti" Managers

    ERIC Educational Resources Information Center

    Angot, Jacques; Malloch, Hedley; Kleymann, Birgit

    2008-01-01

    Purpose: The paper aims to show how professional identity is constructed at a very early stage of initial management education. In so doing, it questions the notion of "le metier" in management. Design/methodology/approach: The paper is based on a study of the experiences of six French management apprentices (or apprentis) who…

  13. Exploring medical identity theft.

    PubMed

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  14. Conversations outside the Comfort Zone: Identity Formation in SME Manager Action Learning

    ERIC Educational Resources Information Center

    Anderson, Lisa; Gold, Jeff

    2009-01-01

    In this paper we consider the construction of narrative identity and particularly how managers of small businesses may construct new narrative identities within the activity of the action learning situation. We build on recent work to suggest that the "world" of managers can be explored through a consideration of Vygotsky's socio-cultural theory…

  15. Exploring Medical Identity Theft

    PubMed Central

    Mancilla, Desla; Moczygemba, Jackie

    2009-01-01

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification. PMID:20169017

  16. Using a generalised identity reference model with archetypes to support interoperability of demographics information in electronic health record systems.

    PubMed

    Xu Chen; Berry, Damon; Stephens, Gaye

    2015-01-01

    Computerised identity management is in general encountered as a low-level mechanism that enables users in a particular system or region to securely access resources. In the Electronic Health Record (EHR), the identifying information of both the healthcare professionals who access the EHR and the patients whose EHR is accessed, are subject to change. Demographics services have been developed to manage federated patient and healthcare professional identities and to support challenging healthcare-specific use cases in the presence of diverse and sometimes conflicting demographic identities. Demographics services are not the only use for identities in healthcare. Nevertheless, contemporary EHR specifications limit the types of entities that can be the actor or subject of a record to health professionals and patients, thus limiting the use of two level models in other healthcare information systems. Demographics are ubiquitous in healthcare, so for a general identity model to be usable, it should be capable of managing demographic information. In this paper, we introduce a generalised identity reference model (GIRM) based on key characteristics of five surveyed demographic models. We evaluate the GIRM by using it to express the EN13606 demographics model in an extensible way at the metadata level and show how two-level modelling can support the exchange of instances of demographic identities. This use of the GIRM to express demographics information shows its application for standards-compliant two-level modelling alongside heterogeneous demographics models. We advocate this approach to facilitate the interoperability of identities between two-level model-based EHR systems and show the validity and the extensibility of using GIRM for the expression of other health-related identities.

  17. The Effects of Virtual Communities on Group Identity in Classroom Management

    ERIC Educational Resources Information Center

    Ho, Tu-Kuang; Lin, Yu-Tzeng

    2016-01-01

    Group identity is a critical component in developing effective classroom management. While there have been numerous studies on group identity, they have primarily focused on its effects on the physical classroom entity. Advances in information technology, however, have enabled the creation of virtual communities, which have become a vital channel…

  18. Adaptation of the Utrecht-Management of Identity Commitments Scale (U-MICS) to the measurement of the parental identity domain.

    PubMed

    Piotrowski, Konrad

    2018-04-01

    The present studies examined the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS) adapted to the measurement of identity formation in the parental identity domain. As the parental identity domain has only been studied within the neo-Eriksonian approach to a very limited extent, the aim of these studies was to prepare a short, valid and reliable tool for the measurement of parental identity in order to fill this gap. The associations of commitment, in-depth exploration and reconsideration of commitment in the parental domain with well-being and with other identity constructs were analyzed. The results showed that parental identity formation is associated with mothers' satisfaction with life and trait anxiety and with identity formation in other areas as well. The initial results suggest that the adapted version of the U-MICS is a valid and reliable measure that can be used in future studies on parental identity formation. © 2017 The Author. Scandinavian Journal of Psychology published by Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  19. Issues of E-Learning Standards and Identity Management for Mobility and Collaboration in Higher Education

    ERIC Educational Resources Information Center

    Alves, Paulo; Uhomoibhi, James

    2010-01-01

    Purpose: This paper seeks to investigate and report on the status of identity management systems and e-learning standards across Europe for promoting mobility, collaboration and the sharing of contents and services in higher education institutions. Design/methodology/approach: The present research work examines existing e-learning standards and…

  20. The medical leadership challenge in healthcare is an identity challenge.

    PubMed

    Andersson, Thomas

    2015-01-01

    The purpose of this article is to describe and analyse the identity challenges that physicians with medical leadership positions face. Four qualitative case studies were performed to address the fact that identity is processual, relational and situational. Physicians with managerial roles were interviewed, as well as their peers, supervisors and subordinates. Furthermore, observations were made to understand how different identities are displayed in action. This study illustrates that medical leadership implies identity struggles when physicians have manager positions, because of the different characteristics of the social identities of managers and physicians. Major differences are related between physicians as autonomous individuals in a system and managers as subordinates to the organizational system. There are psychological mechanisms that evoke the physician identity more often than the managerial identity among physicians who are managers, which explains why physicians who are managers tend to remain foremost physicians. The implications of the findings, that there are major identity challenges by being both a physician and manager, suggest that managerial physicians might not be the best prerequisite for medical leadership, but instead, cooperative relationships between physicians and non-physician managers might be a less difficult way to support medical leadership. Acknowledging and addressing identity challenges can be important both in creating structures in organizations and designing the training for managers in healthcare (both physicians and non-physicians) to support medical leadership. Medical leadership is most often related to organizational structure and/or leadership skills, but this paper discusses identity requirements and challenges related to medical leadership.

  1. Identity management strategies among HIV-positive Colombian gay men in London.

    PubMed

    Jaspal, Rusi; Williamson, Iain

    2017-12-01

    This study set out to explore the social-psychological aspects of living with HIV among a group of HIV-positive Colombian gay men in London, and the strategies that they deployed to manage ensuing threats to their identities. Focus group and individual interview data were collected from 14 Colombian gay men living with HIV, and were analysed using qualitative thematic analysis and identity process theory. The following themes are discussed: (1) identity struggles and conflicts in Colombia, (2), managing multiple layers of social stigma in England, and (3) changing interpersonal and intergroup dynamics, which highlight the inter-connections between sexual prejudice, sexual risk-taking and HIV stigma. Identity may be chronically threatened due to the multiple layers of stigma, which can limit the coping strategies available to individuals. Findings strongly support the need for action and programmes to highlight and tackle both racism and HIV stigma on the gay scene and to fund more specific resources for sub-communities of gay, bisexual and other men who have sex with men, which employ appropriately trained and culturally competent staff.

  2. Dialogue, Language and Identity: Critical Issues for Networked Management Learning

    ERIC Educational Resources Information Center

    Ferreday, Debra; Hodgson, Vivien; Jones, Chris

    2006-01-01

    This paper draws on the work of Mikhail Bakhtin and Norman Fairclough to show how dialogue is central to the construction of identity in networked management learning. The paper is based on a case study of a networked management learning course in higher education and attempts to illustrate how participants negotiate issues of difference,…

  3. Patient Privacy, Consent, and Identity Management in Health Information Exchange

    PubMed Central

    Hosek, Susan D.; Straus, Susan G.

    2013-01-01

    Abstract The Military Health System (MHS) and the Veterans Health Administration (VHA) have been among the nation's leaders in health information technology (IT), including the development of health IT systems and electronic health records that summarize patients' care from multiple providers. Health IT interoperability within MHS and across MHS partners, including VHA, is one of ten goals in the current MHS Strategic Plan. As a step toward achieving improved interoperability, the MHS is seeking to develop a research roadmap to better coordinate health IT research efforts, address IT capability gaps, and reduce programmatic risk for its enterprise projects. This article contributes to that effort by identifying gaps in research, policy, and practice involving patient privacy, consent, and identity management that need to be addressed to bring about improved quality and efficiency of care through health information exchange. Major challenges include (1) designing a meaningful patient consent procedure, (2) recording patients' consent preferences and designing procedures to implement restrictions on disclosures of protected health information, and (3) advancing knowledge regarding the best technical approaches to performing patient identity matches and how best to monitor results over time. Using a sociotechnical framework, this article suggests steps for overcoming these challenges and topics for future research. PMID:28083296

  4. "Managing identities" and parental disclosure of HIV sero-status in Zimbabwe.

    PubMed

    Muparamoto, Nelson; Chiweshe, Manase Kudzai

    2015-01-01

    Drawing from a small sample of HIV infected respondents, this paper examines parents' perceptions on the decision to disclose or not to disclose their HIV sero-status to their children. It explores how parents control the information in the interactional ritual with their children. The paper uses Goffman's concept of dramaturgy to analyse how parents manage and control disclosure within a context where HIV and AIDS is associated with stigma. Disclosure is a strategic encounter in which the interactants (parents) manage to create a desired identity or spoil an identity. Qualitative research incorporating focus group discussions and in-depth interviews was used to examine the perceptions of parents who are HIV positive on disclosure of their status to their children. Such a methodological approach allows for a nuanced understanding of the context in which decision to disclose status happens. The study findings show that in a social context involving parents and children as actors there are complex expectations which affect parental disclosure of HIV sero-status to their children. The desire to manage an expected identity militated or enabled disclosure in a parental relationship.

  5. Identity Verification Systems as a Critical Infrastructure

    DTIC Science & Technology

    2012-03-01

    COVERED Master’s Thesis 4 . TITLE AND SUBTITLE Identity Verification Systems as a Critical Infrastructure 5. FUNDING NUMBERS 6. AUTHOR(S...43 3. Cybercrime .........................................................................................45 4 ...24 Figure 3. Uses of Fictitious or Stolen Identity ................................................................30 Figure 4

  6. Identity management and privacy languages technologies: Improving user control of data privacy

    NASA Astrophysics Data System (ADS)

    García, José Enrique López; García, Carlos Alberto Gil; Pacheco, Álvaro Armenteros; Organero, Pedro Luis Muñoz

    The identity management solutions have the capability to bring confidence to internet services, but this confidence could be improved if user has more control over the privacy policy of its attributes. Privacy languages could help to this task due to its capability to define privacy policies for data in a very flexible way. So, an integration problem arises: making work together both identity management and privacy languages. Despite several proposals for accomplishing this have already been defined, this paper suggests some topics and improvements that could be considered.

  7. Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.

    PubMed

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  8. Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management

    PubMed Central

    Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2015-01-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability. PMID:26688598

  9. Identity Management and Trust Services: Foundations for Cloud Computing

    ERIC Educational Resources Information Center

    Suess, Jack; Morooney, Kevin

    2009-01-01

    Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…

  10. Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning

    ERIC Educational Resources Information Center

    Brennan, Michael

    2012-01-01

    Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…

  11. Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus,more » describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.« less

  12. Professional Identities of Middle Managers: A Case Study in the Faculty of Health and Social Care

    ERIC Educational Resources Information Center

    Thomas-Gregory, Annette

    2014-01-01

    This article presents and discusses the findings of a recent study on the professional identities of middle managers in a school of healthcare in a selected Chartered (pre-1992) UK university. Attention focuses on the career backgrounds of the middle managers, perception of identity and the interactional balance between the professional, academic…

  13. Spoiled Group Identities and Backstage Work: A Theory of Stigma Management Rehearsals

    ERIC Educational Resources Information Center

    O'Brien, John

    2011-01-01

    How do persons with a stigmatized identity learn potential responses to discrimination and harassment? Drawing on three and a half years of ethnographic data, this paper demonstrates how members of a group of Muslim American youth are socialized in locally dominant stigma management strategies through stigma management rehearsals. Stigma…

  14. Multiswitching combination synchronisation of non-identical fractional-order chaotic systems

    NASA Astrophysics Data System (ADS)

    Bhat, Muzaffar Ahmad; Khan, Ayub

    2018-06-01

    In this paper, multiswitching combination synchronisation (MSCS) scheme has been investigated in a class of three non-identical fractional-order chaotic systems. The fractional-order Lorenz and Chen systems are taken as the drive systems. The combination of multidrive systems is then synchronised with the fractional-order Lü chaotic system. In MSCS, the state variables of the two drive systems synchronise with different state variables of the response system, simultaneously. Based on the stability of fractional-order chaotic systems, the MSCS of three fractional-order non-identical systems has been investigated. For the synchronisation of three non-identical fractional-order chaotic systems, suitable controllers have been designed. Theoretical analysis and numerical results are presented to demonstrate the validity and feasibility of the applied method.

  15. Wildland recreationists’ natural resource management purposes and preferences: a connection to environmental identity

    Treesearch

    Patricia L. Winter; Deborah J. Chavez

    2008-01-01

    Wilderness and day use recreationists’ preferences for natural resource management and their perceptions of purposes for management are examined in this paper. Environmental identity (EID) salience is used to help shed light on variations in recreationists’ preferences for how natural resources should be managed. Findings from two studies are reported; the first was...

  16. Solving Identity Management and Interoperability Problems at Pan-European Level

    NASA Astrophysics Data System (ADS)

    Sánchez García, Sergio; Gómez Oliva, Ana

    In a globalized digital world, it is essential for persons and entities to have a recognized and unambiguous electronic identity that allows them to communicate with one another. The management of this identity by public administrations is an important challenge that becomes even more crucial when interoperability among public administrations of different countries becomes necessary, as persons and entities have different credentials depending on their own national legal frameworks. More specifically, different credentials and legal frameworks cause interoperability problems that prevent reliable access to public services in a cross-border scenarios like today's European Union. Work in this doctoral thesis try to analyze the problem in a carefully detailed manner by studying existing proposals (basically in Europe), proposing improvements in defined architectures and performing practical work to test the viability of solutions. Moreover, this thesis will also address the long-standing security problem of identity delegation, which is especially important in complex and heterogeneous service delivery environments like those mentioned above. This is a position paper.

  17. Group affiliation in self-management: support or threat to identity?

    PubMed

    Bossy, Dagmara; Knutsen, Ingrid Ruud; Rogers, Anne; Foss, Christina

    2017-02-01

    Self-management is considered important in chronic illness, and contemporary health policy recommends participation in support groups for individuals with chronic conditions. Although withdrawal from or non-participation in support groups is an important problem, there is limited knowledge about individuals' own motivation for participation in or withdrawal from self-management support groups. To investigate how individuals with type 2 diabetes perceive participation in group-based self-management support. This is a qualitative focus group study using a semi-structured interview guide. Sixteen participants diagnosed with type 2 diabetes were included in the study. Individuals with and without group affiliations were mixed in three focus groups to trigger discussions. In the analysis, reoccurring themes of engagement and discussions between participants were focused within a theoretical frame of institutional logic. The focus groups are seen as social spaces where participants construct identity. Both participation and non-participation in group-based self-management support are associated with dealing with the stigma of having type 2 diabetes. Negotiations contribute to constructing an illness dignity as a response to the logic of moral responsibility for the disease. Contemporary policy contributes to societal understandings of individuals with type 2 diabetes as morally inadequate. Our study shows that group-based self-management support may counteract blame and contribute in negotiations of identity for individuals with type 2 diabetes. This mechanism makes participation in groups beneficial for some but stigma inducing for others. © 2016 The Authors. Health Expectations Published by John Wiley & Sons Ltd.

  18. Managing identity impacts associated with disclosure of HIV status: a qualitative investigation

    PubMed Central

    Frye, Victoria; Fortin, Princess; MacKenzie, Sonja; Purcell, David; Edwards, Lorece V.; Mitchell, Shannon Gwin; Valverde, Eduardo; Garfein, R.; Metsch, Lisa; Latka, Mary H

    2011-01-01

    Disclosure of HIV status to potential and current sex partners by HIV-positive people (HIVPP) is a complex issue that has received a significant amount of attention. Research has found that disclosure depends upon the evaluation by HIVPP of potential benefits and risks, especially of the risks stemming from the profound social stigma of HIV and AIDS. Drawing on concepts from Goffman’s classic stigma theory and Anderson’s more recently developed cultural-identity theory of drug abuse, we analyzed data from in-depth, post-intervention qualitative interviews with 116 heterosexually active, HIV-positive injection drug users enrolled in a randomized trial of a behavioral intervention to prevent HIV transmission. We explored how disclosure experiences lead to “identity impacts” defined as: (1) identity challenges (i.e. interactions that challenge an individual’s self-concept as a “normal” or non-deviant individual); and (2) identity transformations (i.e. processes whereby an individual comes to embrace a new identity and reject behaviors and values of an old one, resulting in the conscious adoption of a social and/or public identity as an HIV-positive individual). Participants engaged in several strategies to manage the identity impacts associated with disclosure. Implications of these findings for research and prevention programming are discussed. PMID:20024764

  19. [Effects of an integrated self-management program on self-management, glycemic control, and maternal identity in women with gestational diabetes mellitus].

    PubMed

    Kim, HeeSook; Kim, Sue

    2013-02-01

    The purpose of the study was to investigate the effects of an integrated self-management program on self-management, glycemic control, and maternal identity in women with gestational diabetes mellitus (GDM). A non-equivalent control group non-synchronized quasi-experimental design was used. A total of 55 women with GDM were recruited from Cheil General Hospital, Seoul, Korea and were assigned to an experimental (n=28) or control group (n=27). The participants were 24-30 weeks pregnant women who had been diagnosed with GDM as of July 30, 2010. The program was conducted as a 1 hour small group meeting 3 out of 5 times and by telephone-counseling 2 out of 5 times. The integrated self-management program was verified by an expert panel. Although there was no significant reduction in HbA1c (U= -1.17, p=.238), there were statistically significant increases in self-management (U= -3.80, p<.001) and maternal identity (U= -4.48, p<.001), and decreased 2-h postprandial glucose levels (U= -2.43, p<.015) in the experimental group compared to the control group. These findings suggest that an integrated self-management program for women with GDM improves self-management, maternal identity, and glycemic control. Further studies are needed to identify the effects of an integrated self-management program on pregnancy and neonatal outcomes.

  20. Understanding African American Adolescents’ Identity Development: A Relational Developmental Systems Perspective

    PubMed Central

    Brittian, Aerika S.

    2012-01-01

    This article examines the development of African American adolescents’ identity using a relational developmental systems theory framework, which led to the expectation that identity development is linked to both the reduction of risk behaviors and the promotion of African American adolescents’ healthy development. Different personological theories of identity development were discussed, including Erikson’s theory of psychosocial development and Marcia’s theory of identity statuses. Developmental systems theory was used to further the literature on African American adolescents’ identity development, by integrating various views of identity development as they pertain to these youth. Furthermore, the formation of many aspects of identity may be an important coping and resilience process for such youth. In addition, directions for future research are discussed, including a consideration of the complexity of diversity that exists within the African American adolescent population, and a call for more longitudinal assessments of identity development is presented. PMID:23243325

  1. Intergroup conflict management strategies as related to perceptions of dual identity and separate groups.

    PubMed

    Bizman, Aharon; Yinon, Yoel

    2004-04-01

    The authors examined the relations between (a) the perceptions of dual identity and separate groups and (b) intergroup conflict management strategies, in two contexts: the conflict between the secular and religious sectors in Israel and the allocation of resources among organizational subunits. In both contexts, contention (i.e., forcing one's will on the other party) was associated with the perception of separate groups. Only in the organizational context, avoidance (i.e., doing nothing or discontinuing participation in the conflict) was associated with the perception of dual identity. Problem solving (i.e., finding a solution that is acceptable to both parties) was related to the perception of dual identity in the secular-religious context. In the organizational context, this relation appeared only under a low perception of separate groups. Yielding (i.e., satisfying the other party's needs at the expense of one's own) was related to the perception of dual identity in the organizational context. In the secular-religious context, this relation appeared only under a high perception of separate groups. The authors discussed the varying pattern of the associations between (a) the perceptions of dual identity and separate groups and (b) the conflict management strategies in the two contexts in terms of the Dual Concern Model and the perceived feasibility of the strategies.

  2. Diversifying Academic and Professional Identities in Higher Education: Some Management Challenges

    ERIC Educational Resources Information Center

    Whitchurch, Celia; Gordon, George

    2010-01-01

    This paper draws on an international study of the management challenges arising from diversifying academic and professional identities in higher education. These challenges include, for instance, the introduction of practice-based disciplines with different traditions such as health and social care, the changing aspirations and expectations of…

  3. Adequate Security Protocols Adopt in a Conceptual Model in Identity Management for the Civil Registry of Ecuador

    NASA Astrophysics Data System (ADS)

    Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio

    2017-08-01

    We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).

  4. Bringing Federated Identity to Grid Computing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Teheran, Jeny

    The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Users in these collaborations are currently required to register as an FNAL user and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access formore » users from diverse experiments and collab orations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.« less

  5. "I'm Scared of the Disappointment": Young Adult Smokers' Relational Identity Gaps and Management Strategies as Sites of Communication Intervention.

    PubMed

    Stanley, Samantha J; Pitts, Margaret Jane

    2018-02-22

    While cigarette smoking is decreasing among young adults, rates of nicotine consumption through other devices, most notably electronic cigarettes, are on the rise. Framed by communication theory of identity, this study examines young adult smokers' experiences with relational others in regard to their smoking. Focus group discussions and individual interviews convened with 20 young adult cigarette and electronic cigarette smokers revealed identity gaps implicating the relational layer of identity, including personal-relational, enacted-relational, and personal-enacted-relational identity gaps. Participants used communicative and behavioral strategies to manage relational discrepancies. The documented identity gaps and management strategies present opportunities for targeted smoking cessation interventions that amplify dissonance created through identity gaps as a motivational tactic.

  6. The Role of Individual Differences and Situational Variables in the Use of Workplace Sexual Identity Management Strategies.

    PubMed

    Reed, Louren; Leuty, Melanie E

    2016-07-01

    Examination of individual difference variables have been largely ignored within research on the use of workplace sexual identity management strategies. The current study examined personality traits (extraversion, openness, and neuroticism), facets of sexual identity development (identity confusion, internalized heterosexism), and situational variables (e.g., perceptions of workplace climate and heterosexism) in explaining the use of management strategies, as well as possible interactions between individual and situational factors. Perceptions of the workplace climate toward lesbian and gay individuals significantly related to the use each of the management strategies, and Internalized Heterosexism was found to significantly predict the use of the Explicitly Out strategy. Most interactions between individual difference and situational variables were not supported, with the exception of an interaction between workplace heterosexism and internalized homophobia in explaining the use of the Explicitly Out strategy.

  7. 'Even though it's a small checkbox, it's a big deal': stresses and strains of managing sexual identity(s) on Facebook.

    PubMed

    Rubin, Jennifer D; McClelland, Sara I

    2015-01-01

    Facebook offers a socialisation context in which young people from ethnic, gender and sexual minorities must continually manage the potential for prejudice and discrimination in the form of homophobia and racism. In-depth interviews were conducted with eight young women, aged 16-19 years, who self-identified as queer and as women of colour. A detailed analysis of these interviews--focusing in particular on how young people described navigating expectations of rejection from family and friends--offered insight into the psychological and health consequences associated with managing sexual identity(s) while online. The 'closet' ultimately takes on new meaning in this virtual space: participants described trying to develop social relationships within Facebook, which demands sharing one's thoughts, behaviours and ideas, while also hiding and silencing their emerging sexuality. In this 'virtual closet', tempering self-presentation to offset social exclusion has become a continuous, yet personally treacherous, activity during the daily practice of using Facebook.

  8. The NSF Cybersecurity Center of Excellence: Translating Identity Management and Cybersecurity into Scientific Collaboration

    NASA Astrophysics Data System (ADS)

    Welch, V.

    2016-12-01

    Scientists care deeply about their collaborations: who is a member, who can access, produce, and correct data, and manager instruments critical to their science missions. The communities of cybersecurity and identity management professionals develop tools to support collaborations and the undertaking of trustworthy science, but there are large cultural and linguistic gaps between these communities and the scientists they service. The National Science Foundation has recently funded a NSF Cybersecurity Center of Excellence to help its community of projects by providing leadership and addressing the challenges of trustworthy science. A key goal of this NSF Center has been translating between the goals of the science community into requirements and risks understood by identity management and cybersecurity communities. This talk will give an update on the Center's efforts and other services it provides to the NSF community to bridge these cultures.

  9. Systemic Case Formulation, Individualized Process Monitoring, and State Dynamics in a Case of Dissociative Identity Disorder.

    PubMed

    Schiepek, Günter K; Stöger-Schmidinger, Barbara; Aichhorn, Wolfgang; Schöller, Helmut; Aas, Benjamin

    2016-01-01

    Objective: The aim of this case report is to demonstrate the feasibility of a systemic procedure (synergetic process management) including modeling of the idiographic psychological system and continuous high-frequency monitoring of change dynamics in a case of dissociative identity disorder. The psychotherapy was realized in a day treatment center with a female client diagnosed with borderline personality disorder (BPD) and dissociative identity disorder. Methods: A three hour long co-creative session at the beginning of the treatment period allowed for modeling the systemic network of the client's dynamics of cognitions, emotions, and behavior. The components (variables) of this idiographic system model (ISM) were used to create items for an individualized process questionnaire for the client. The questionnaire was administered daily through an internet-based monitoring tool (Synergetic Navigation System, SNS), to capture the client's individual change process continuously throughout the therapy and after-care period. The resulting time series were reflected by therapist and client in therapeutic feedback sessions. Results: For the client it was important to see how the personality states dominating her daily life were represented by her idiographic system model and how the transitions between each state could be explained and understood by the activating and inhibiting relations between the cognitive-emotional components of that system. Continuous monitoring of her cognitions, emotions, and behavior via SNS allowed for identification of important triggers, dynamic patterns, and psychological mechanisms behind seemingly erratic state fluctuations. These insights enabled a change in management of the dynamics and an intensified trauma-focused therapy. Conclusion: By making use of the systemic case formulation technique and subsequent daily online monitoring, client and therapist continuously refer to detailed visualizations of the mental and behavioral network and

  10. The Construction of Early Career Teachers' Identities: Coping or Managing?

    ERIC Educational Resources Information Center

    Hong, Ji; Day, Christopher; Greene, Barbara

    2018-01-01

    This paper examines how early career teachers cope with or manage the challenges that they experience during the transition from pre-service to the first and then the second year of teaching as they seek to establish stable, positive, professional identities and teach effectively in various school and policy contexts. Findings from three waves of…

  11. Free Choice of Learning Management Systems: Do Student Habits Override Inherent System Quality?

    ERIC Educational Resources Information Center

    Porter, Gavin W.

    2013-01-01

    Purpose: Although multiple studies examine institutional transitions of learning management systems (LMS) or compare their merits, studies examining students' free choice of access on parallel LMSs for the same course are absent from the literature. In order to investigate usage in a free-choice situation, identical content was posted at the same…

  12. Management System for Engineering Ethics

    NASA Astrophysics Data System (ADS)

    Yashiro, Tomonari

    In the context of independent profession based societies, ethics charter/codes of professional bodies have significant influence on the conduct of engineers. Contrarily in Japan, most of active engineers are in-house and feel immediate identity as the member of firm or institution, rather than professional bodies. Therefore, establishment and operation of engineering ethics management system (E2ms) is essential for incentive to make innovative and ethical decision with confidence. The paper introduces the outline of the educational kit for E2ms developed by the author. The kit aims to enhance ability of management relevant to E2ms. The kit also involves ten cases for case method teaching. The test use of the kit indicates the potential to create satisfactory educational achievement.

  13. A network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption

    NASA Astrophysics Data System (ADS)

    Zhu, Lijuan; Liu, Jingao

    2013-07-01

    This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.

  14. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey.

    PubMed

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospital grounds. These QR code bracelets link to the QR Code Identity website, where detailed information is stored; a smartphone or standalone QR code scanner can be used to scan the code. The design of this system allows authorized personnel (e.g., paramedics, firefighters, or police) to access more detailed patient information than the average smartphone user: emergency service professionals are authorized to access patient medical histories to improve the accuracy of medical treatment. In Istanbul, we tested the self-designed system with 174 participants. To analyze the QR Code Identity Tag system's usability, the participants completed the System Usability Scale questionnaire after using the system.

  15. When Social Identities Collide: Commentary on "Gender in the Management Education Classroom"

    ERIC Educational Resources Information Center

    Patton, Eric

    2010-01-01

    This commentary to "Gender in the Management Education Classroom" (Bilimoria, O'Neil, Hopkins, & Murphy, 2010) employs social identity and self-categorization theory to analyze the incident described in the article. In any MBA classroom, students are dealing with multiple group memberships. Similar to workplace settings, when the focus is on…

  16. Social Identity Simulation System (SISTEM)

    DTIC Science & Technology

    2014-03-31

    Report Individuation Individuation refers to when an individual attempts to preserve self-esteem by psychologically separating oneself from a...its expected costs. The following subsections describe various strategies of social identity entrepreneurship in more detail. Calling for...Haslam, S. A., & Reicher, S. (2007). Identity Entrepreneurship and the consequences of identity failure: the dynamics of leadership in the BBC prison

  17. Claims and Identity: On-Premise and Cloud Solutions

    NASA Astrophysics Data System (ADS)

    Bertocci, Vittorio

    Today's identity-management practices are often a patchwork of partial solutions, which somehow accommodate but never really integrate applications and entities separated by technology and organizational boundaries. The rise of Software as a Service (SaaS) and cloud computing, however, will force organizations to cross such boundaries so often that ad hoc solutions will simply be untenable. A new approach that tears down identity silos and supports a de-perimiterized IT by design is in order.This article will walk you through the principles of claims-based identity management, a model which addresses both traditional and cloud scenarios with the same efficacy. We will explore the most common token exchange patterns, highlighting the advantages and opportunities they offer when applied on cloud computing solutions and generic distributed systems.

  18. An exploration of mothers' and fathers' views of their identities in chronic-kidney-disease management: parents as students?

    PubMed

    Swallow, Veronica

    2008-12-01

    To explore parents' views of their identities as they learn to manage their child's chronic kidney disease. Parents are expected to participate in management and usually learn necessary skills from the multidisciplinary team. Research highlights the importance of professionals defining parents' management roles in chronic disease; but little is known about parents' views on their own identities as the complex and dynamic process of teaching and learning unfolds around their child's condition. According to positioning theory, identity development is a dynamic and fluid process that occurs during interaction, with each person positioning themselves while simultaneously positioning the other person, yet this concept has not been considered in relation to parents' contributions to disease management. A longitudinal, grounded theory study conducted in a UK Children's Kidney Unit. This paper focuses on one aspect of a larger study exploring family learning in disease management. Six mothers and two fathers of six children with a recently diagnosed chronic kidney disease participated in a total of 21 semi-structured interviews during the 18 months after referral to the unit. Interviews included discussion about the parts they played in relation to professionals during the management process. Findings were interpreted within a framework of positioning theory. Parents participated in teaching/learning/assessment that was both planned (involving allocated clinical lessons and tasks) and spontaneous (in response to current situations), to facilitate their participation. They positioned multidisciplinary team members as teachers as well as professionals, simultaneously positioning themselves as students as well as parents. Parents' clinical duties and obligations are not an automatic part of parenting but become part of the broader process of sharing disease management, this can lead to them assuming the additional identity of a 'student'. Involving parents in ongoing

  19. Use of standardized multidimensional evaluation tools and the emergence of the case manager's professional identity in France.

    PubMed

    Nugue, Mathilde; De Stampa, Matthieu; Couturier, Yves; Somme, Dominique

    2012-01-01

    In France, the national public health plan proposes a group of innovations including the initiation of case management for older adults in complex situations, particularly those with cognitive disorders. In this context, public authorities asked case managers to use a standardized multidimensional evaluation tool. The results of a qualitative study on the pertinence of such a tool relative to the emergence of this new professional field are described. Early use of an evaluation tool seems to be linked to the emergence of a new professional identity for recently recruited case managers. Factors determining the strength of this link are training tool standardization, computerization, and local structure's involvement. Our results contribute to identifying one of the ways by which professional identity can be changed to become a case manager.

  20. Rewriting Dominant Narratives of the Academy: Women Faculty of Color and Identity Management

    ERIC Educational Resources Information Center

    Motha, Suhanthie; Varghese, Manka M.

    2018-01-01

    Drawing on Delgado and Yosso's "counterstory," Yosso's "community cultural wealth," and Alsup's "borderland discourses," the authors, who are women of color academics, use narratives from their lives to discuss the ways in which they draw on resources in managing and reconfiguring their multiple identities within the…

  1. Leadership, New Public Management and the Re-Modelling and Regulation of Teacher Identities

    ERIC Educational Resources Information Center

    Hall, David; Gunter, Helen; Bragg, Joanna

    2013-01-01

    This article examines the rapidly shifting relationship between teachers and the state and efforts to re-model teacher identities within the wider context of public sector modernization and the New Public Management. The construction and development of officially authorized and normative discursive practices relating to leadership and the…

  2. We're Decent People: Constructing and Managing Family Identity in Rural Workingclass Communities

    ERIC Educational Resources Information Center

    Kiter Edwards, Margie L.

    2004-01-01

    Using grounded theory methodology, I establish family identity management as an important type of invisible work that connects women's household-based domestic activities with community members perceptions and treatment of them and their family members. Detailed observations of household routines and family interactions, as well as in-depth…

  3. A network identity authentication system based on Fingerprint identification technology

    NASA Astrophysics Data System (ADS)

    Xia, Hong-Bin; Xu, Wen-Bo; Liu, Yuan

    2005-10-01

    Fingerprint verification is one of the most reliable personal identification methods. However, most of the automatic fingerprint identification system (AFIS) is not run via Internet/Intranet environment to meet today's increasing Electric commerce requirements. This paper describes the design and implementation of the archetype system of identity authentication based on fingerprint biometrics technology, and the system can run via Internet environment. And in our system the COM and ASP technology are used to integrate Fingerprint technology with Web database technology, The Fingerprint image preprocessing algorithms are programmed into COM, which deployed on the internet information server. The system's design and structure are proposed, and the key points are discussed. The prototype system of identity authentication based on Fingerprint have been successfully tested and evaluated on our university's distant education applications in an internet environment.

  4. Brief Report: The Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS)--Factor Structure, Reliability, and Convergent Validity in French-Speaking University Students

    ERIC Educational Resources Information Center

    Zimmermann, Gregoire; Mahaim, Elodie Biermann; Mantzouranis, Gregory; Genoud, Philippe A.; Crocetti, Elisabetta

    2012-01-01

    The purpose of this study was to evaluate the factor structure and the reliability of the French versions of the Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS) in a sample of college students (N = 457, 18-25 years old). Confirmatory factor analyses confirmed the hypothesized three-factor solution…

  5. Report: Improvements Needed in CSB’s Identity and Access Management and Incident Response Security Functions

    EPA Pesticide Factsheets

    Report #18-P-0030, October 30, 2017. Weaknesses in the Identity and Access Management and Incident Response metric domains leave the CSB vulnerable to attacks occurring and not being detected in a timely manner.

  6. Understanding African American Adolescents' Identity Development: A Relational Developmental Systems Perspective

    ERIC Educational Resources Information Center

    Brittian, Aerika S.

    2012-01-01

    This article examines the development of African American adolescents' identity using a relational developmental systems theory framework, which led to the expectation that identity development is linked to both the reduction of risk behaviors and the promotion of African American adolescents' healthy development. Different personological theories…

  7. Using Systems Theory to Understand the Identity of Academic Advising: A Case Study

    ERIC Educational Resources Information Center

    Bridgen, Sean

    2017-01-01

    For decades, advising practitioners and scholars have worked toward developing an identity for advising as a unique field of scholarly inquiry and practice. To date, the identity crisis in advising remains. This study presents an examination and description of the function, purpose, and identity of a university advising system through comparisons…

  8. The importance of social identities in the management of and recovery from 'Diabulimia': A qualitative exploration.

    PubMed

    Hastings, Amy; McNamara, Niamh; Allan, Jacqueline; Marriott, Mike

    2016-12-01

    A significant barrier to recovery for individuals with co-morbid eating disorders and type 1 diabetes is the way in which group members self-categorise. Nonetheless, identity issues are neglected during the recovery process. The aim of this paper is to explore how group memberships (and the associated identities) both contribute to and hinder recovery in this cohort. Transcripts from five online focus groups with 13 members of an online support group for individuals with 'Diabulimia' were thematically analysed. Findings suggested that those with whom one shares a recovery identity can be well placed to provide psychological resources necessary for successful recovery although such connections can be damaging if group norms are not managed. Members recognised that other important relationships (including family and friends and health professionals) are also key to recovery; these other group memberships (and the associated identities) can be facilitated through the recovery identity group membership, which allows for external validation of the recovery identity, provides encouragement to disclose the illness to supportive others, and provides information to facilitate positive service interactions. While clinical interventions typically focus on eliminating disordered behaviours, we suggest that these should also include strengthening important group memberships that promote recovery.

  9. Managing risk and marginalizing identities: on the society-of-captives thesis and the harm of social dis-ease.

    PubMed

    Arrigo, Bruce A

    2013-06-01

    This article develops the constitutive features of the society-of-captives thesis as suggested by Arrigo and Milovanovic, and Arrigo, Bersot, and Sellers. The relevance of this thesis is briefly explored in relation to the institutional and community-based treatment philosophies that currently inform the mental health and criminal justice systems. This exploration specifies how risk (being human and doing humanness differently) is managed symbolically, linguistically, materially, and culturally. The management of this risk extends to the kept as well as to their keepers, regulators, and watchers (i.e., the society of captives). This article calls for a new clinical praxis (being/doing a critical mindfulness) designed to overcome the totalizing madness (the harm of social dis-ease) that follows from managing risk fearfully and marginalizing identities desperately as reified recursively through society's captivity. The ethical underpinnings of this clinical praxis represent an emergent direction for undertaking correctional policy reform.

  10. Family support in the transition to adulthood in Portugal--its effects on identity capital development, uncertainty management and psychological well-being.

    PubMed

    Oliveira, José Egídio; Mendonça, Marina; Coimbra, Susana; Fontaine, Anne Marie

    2014-12-01

    In a familistic southern European society such as the Portuguese, the family has historically played a prominent role in supporting the negotiation of transition pathways into adulthood. The present study aimed at capturing (1) the relative weight of parental financial support and autonomy support in contributing to the youngsters' psychological well-being (PWB), and (2) the mediating role of identity capital and uncertainty management in this relationship. A total of 620 participants completed measures of parental support, identity capital, uncertainty management and PWB. Autonomy support was found to be the strongest predictor of PWB, both directly and indirectly through its effects on identity capital and the use of target focused uncertainty management strategies. Conversely, financial support evidenced only a minor indirect impact through the mediation of tangible identity capital. Autonomy stimulation may constitute one of the most developmentally determinant family challenges in assisting the process of coming of age in Portugal. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  11. Identity management, negotiation and resistance among women in the sex trade in London, Ontario.

    PubMed

    Orchard, Treena; Farr, Sara; Macphail, Susan; Wender, Cass; Young, Dawn

    2013-01-01

    Sex work, and ideas about women in the trade, have long been represented as tragic and/or threatening. However, such portrayals tell us very little about how women think about themselves and the kinds of work they do. The data for this paper come from an ethnographic, community-based study in London, Ontario, that involves women in street-based, indoor and transactional sex work. This discussion focuses on how women develop different individual identities, including the management of multiple selves, their sexual identities and what we have termed the 'good junkie' identity. We also examine how these women employ aspects of dominant representation of sex workers, namely the low status accorded to those in street-based work and the defamatory term 'whore' or 'ho', when negotiating the moral hierarchies that exist within various kinds of sex work (i.e., stripping, massage parlours) and making sense of their professional and personal lives. The work that goes into the creation and maintenance of the women's divergent identities sheds important light on this complicated and tremendously demanding, yet inadequately understood, aspect of life as women in the sex trade.

  12. "Everybody Puts Their Whole Life on Facebook": Identity Management and the Online Social Networks of LGBTQ Youth.

    PubMed

    McConnell, Elizabeth; Néray, Bálint; Hogan, Bernie; Korpak, Aaron; Clifford, Antonia; Birkett, Michelle

    2018-05-26

    Lesbian, gay, bisexual, transgender, and queer (LGBTQ) youth and young adults almost inevitably "come out", or self-disclose their identity to others. Some LGBTQ youth are more uniformly "out", while others may disclose to some groups but not others. This selective disclosure is complicated on real name social media sites, which tend to encourage a unified presentation of self across social contexts. We explore these complications with a cohort of LBGTQ youth on Facebook ( N = 199, M age = 24.13). Herein we ask: How do LBGTQ youth manage the disclosure of their sexual orientation and/or gender identity to different people in their lives? Further, are there identifiable differences in the online social network structure for LGBTQ youth who manage outness in different ways? Finally, how do LGBTQ young people describe their experiences on Facebook? We answer these questions using a mixed methods approach, combining statistical cluster analysis, network visualization, and qualitative data. Our findings illustrate patterns in network structure by outness cluster type, highlighting both the work involved in managing one's online identity as well as the costs to (semi-) closeted individuals including a considerably lower overall network connectivity. In particular, outness to family characterized LGBTQ young people's experiences on Facebook.

  13. Academic Manager or Managed Academic? Academic Identity Schisms in Higher Education

    ERIC Educational Resources Information Center

    Winter, Richard

    2009-01-01

    The relationship between values and academic identity has received scant attention in the higher education literature with some notable exceptions (Churchman, 2006; Harley, 2002; Henkel, 2005). This paper contends that the perceived need to align all academics around corporate values and goals has given rise to academic identity schisms in higher…

  14. Are drug treatment services only for 'thieving junkie scumbags'? Drug users and the management of stigmatised identities.

    PubMed

    Radcliffe, Polly; Stevens, Alex

    2008-10-01

    This article uses qualitative interviews with 53 problematic drug users who had dropped out of treatment in England, UK to explore how they describe the stigmatisation of drug users and drug services. It discusses the construction of the category of the junkie through its association with un-controlled heroin use and criminality. It shows how some drug users carefully manage information about their discreditable identities by excluding themselves from this category, while acknowledging its validity for other drug users. The junkie identity was generally seen as shameful and therefore to be avoided, although it holds attractions for some drug users. For many of the interviewees, entry to treatment risked exposing their own activities as shaming, as they saw treatment as being a place that was populated by junkies and where it becomes more difficult to manage discreditable information. The treatment regime, e.g. the routine of supervised consumption of methadone, was itself seen by some as stigmatising and was also seen as hindering progress to the desired 'normal' life of conventional employment. Participation in the community of users of both drugs and drug services was perceived as potentially damaging to the prospects of recovery. This emphasises the importance of social capital, including links to people and opportunities outside the drug market. It also highlights the danger that using the criminal justice system to concentrate prolific offenders in treatment may have the perverse effects of excluding other people who have drug problems and of prolonging the performance of the junkie identity within treatment services. It is concluded that treatment agencies should address these issues, including through the provision of more drug services in mainstream settings, in order to ensure that drug services are not seen to be suitable only for one particularly stigmatised category of drug user.

  15. SuperIdentity: Fusion of Identity across Real and Cyber Domains

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Black, Sue; Creese, Sadie; Guest, Richard

    Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single 'SuperIdentity'. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factorsmore » being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the 'distribution of identity' across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat.« less

  16. Identity Federation and Its Importance for NASA's Future: The SharePoint Extranet Pilot

    NASA Technical Reports Server (NTRS)

    Baturin, Rebecca R.

    2013-01-01

    My project at Kennedy Space Center (KSC) during the spring 2013 Project Management and Systems Engineering Internship was to functionalJy test and deploy the SharePoint Extranet system and ensure successful completion of the project's various lifecycle milestones as described by NASA Procedural Requirement (NPR) 7 120.7. I worked alongside NASA Project Managers, Systems Integration Engineers, and Information Technology (IT) Professionals to pilot this collaboration capability between NASA and its External Partners. The use of identity federation allows NASA to leverage externally-issued credentials of other federal agencies and private aerospace and defense companies, versus the traditional process of granting and maintaining full NASA identities for these individuals. This is the first system of its kind at NASA and it will serve as a pilot for the Federal Government. Recognizing the novelty of this service, NASA's initial approach for deployment included a pilot period where nearby employees of Patrick Air Force Base would assist in testing and deployment. By utilizing a credential registration process, Air Force users mapped their Air Force-issued Common Access Cards (CAC) to a NASA identity for access to the External SharePoint. Once the Air Force stands up an Active Directory Federation Services (ADFS) instance within their Data Center and establishes a direct trust with NASA, true identity federation can be established. The next partner NASA is targeting for collaboration is Lockheed Martin (LMCO), since they collaborate frequently for the ORION Program. Through the use of Exostar as an identity hub, LMCO employees will be able to access NASA data on a need to know basis, with NASA ultimately managing access. In a time when every dollar and resource is being scrutinized, this capability is an exciting new way for NASA to continue its collaboration efforts in a cost and resource effective manner.

  17. Mechanisms of Identity Conflict: Uncertainty, Anxiety, and the Behavioral Inhibition System.

    PubMed

    Hirsh, Jacob B; Kang, Sonia K

    2016-08-01

    Social identities are associated with normative standards for thought and action, profoundly influencing the behavioral choices of individual group members. These social norms provide frameworks for identifying the most appropriate actions in any situation. Given the increasing complexity of the social world, however, individuals are more and more likely to identify strongly with multiple social groups simultaneously. When these groups provide divergent behavioral norms, individuals can experience social identity conflict. The current manuscript examines the nature and consequences of this socially conflicted state, drawing upon advances in our understanding of the neuropsychology of conflict and uncertainty. Identity conflicts are proposed to involve activity in the Behavioral Inhibition System, which in turn produces high levels of anxiety and stress. Building upon this framework, four strategies for resolving identity conflict are reviewed. © 2015 by the Society for Personality and Social Psychology, Inc.

  18. Linking User Identities Across the DataONE Federation of Data Repositories

    NASA Astrophysics Data System (ADS)

    Jones, M. B.; Mecum, B.; Leinfelder, B.; Jones, C. S.; Walker, L.

    2016-12-01

    DataONE provides services for identifying, authenticating, and authorizing researchers to access and contribute data to repositories within the DataONE federation. In the earth sciences, thousands of institutional and disciplinary repositories have created their own user identity and authentication systems with their own user directory based on a database or web content management systems. Thus, researchers have many identities that are neither linked nor interoperable, making it difficult to reference the identity of these users across systems. Key user information is hidden, and only a non-disambiguated name is often available. From a sample of 160,000 data sets within DataONE, a super-majority of references to the data creators lack even an email address. In an attempt to disambiguate these people via the GeoLink project, we conservatively estimate they represent at least 57,000 unique identities, but without a clear user identifier, there could be as many as 223,000. Interoperability among repositories is critical to improving the scope of scientific synthesis and capabilities for research collaboration. While many have focused on the convenience of Single Sign-On (SSO), we have found that sharing user identifiers is far more useful for interoperability. With an unambiguous user identity in incoming metadata, DataONE has built user-profiles that present that user's data across repositories, that link users and their organizational affiliations, and that allow users to work collaboratively in private groups that span repository systems. DataONE's user identity solution leverages existing systems such as InCommon, CILogon, Google, and ORCID to not further proliferate user identities. DataONE provides a core service allowing users to link their multiple identities so that authenticating with one identity (e.g., ORCID) can authorize access to data protected via another identity (e.g., InCommon). Currently, DataONE is using ORCID identities to link and identify

  19. On adaptive modified projective synchronization of a supply chain management system

    NASA Astrophysics Data System (ADS)

    Tirandaz, Hamed

    2017-12-01

    In this paper, the synchronization problem of a chaotic supply chain management system is studied. A novel adaptive modified projective synchronization method is introduced to control the behaviour of the leader supply chain system by a follower chaotic system and to adjust the leader system parameters until the measurable errors of the system parameters converge to zero. The stability evaluation and convergence analysis are carried out by the Lyapanov stability theorem. The proposed synchronization and antisynchronization techniques are studied for identical supply chain chaotic systems. Finally, some numerical simulations are presented to verify the effectiveness of the theoretical discussions.

  20. Design and Development of an Identity Management System: The Minnesota State College-Southeast Technical Case Study

    ERIC Educational Resources Information Center

    Elhindi, Mohamed A.

    2010-01-01

    Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…

  1. The Identity and Identity Identification of Teachers

    ERIC Educational Resources Information Center

    Qu, Zhengwei

    2008-01-01

    When we tend to analyze the living conditions of teachers, system arrangement and identity identification can be considered a significant method for analysis. In reality, there appears a phenomenon of overlapping identification in the identity identification of teachers in China, which leads to plural selections in the identification manners of…

  2. The effects of driver identity on driving safety in a retrospective feedback system.

    PubMed

    Zhao, Guozhen; Wu, Changxu

    2012-03-01

    Retrospective feedback that provides detailed information on a driver's performance in critical driving situations at the end of a trip enhances his/her driving behaviors and safe driving habits. Although this has been demonstrated by a previous study, retrospective feedback can be further improved and applied to non-critical driving situations, which is needed for transportation safety. To propose a new retrospective feedback system that uses driver identity (i.e., a driver's name) and to experimentally study its effects on measures of driving performance and safety in a driving simulator. We conducted a behavioral experimental study with 30 participants. "Feedback type" was a between-subject variable with three conditions: no feedback (control group), feedback without driver identity, and feedback with driver identity. We measured multiple aspects of participants' driving behavior. To control for potential confounds, factors that were significantly correlated with driving behavior (e.g., age and driving experience) were all entered as covariates into a multivariate analysis of variance. To examine the effects of speeding on collision severity in driving simulation studies, we also developed a new index - momentum of potential collision - with a set of equations. Subjects who used a feedback system with driver identity had the fewest speeding violations and central-line crossings, spent the least amount of time speeding and crossing the central line, had the lowest speeding and central-line crossing magnitude, ran the fewest red lights, and had the smallest momentum of potential collision compared to the groups with feedback without driver identity and without feedback (control group). The new retrospective feedback system with driver identity has the potential to enhance a person's driving safety (e.g., speeding, central-line crossing, momentum of potential collision), which is an indication of the valence of one's name in a feedback system design. Copyright

  3. Light-front Ward-Takahashi identity for two-fermion systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marinho, J. A. O.; Frederico, T.; Pace, E.

    We propose a three-dimensional electromagnetic current operator within light-front dynamics that satisfies a light-front Ward-Takahashi identity for two-fermion systems. The light-front current operator is obtained by a quasipotential reduction of the four-dimensional current operator and acts on the light-front valence component of bound or scattering states. A relation between the light-front valence wave function and the four-dimensional Bethe-Salpeter amplitude both for bound or scattering states is also derived, such that the matrix elements of the four-dimensional current operator can be fully recovered from the corresponding light-front ones. The light-front current operator can be perturbatively calculated through a quasipotential expansion, andmore » the divergence of the proposed current satisfies a Ward-Takahashi identity at any given order of the expansion. In the quasipotential expansion the instantaneous terms of the fermion propagator are accounted for by the effective interaction and two-body currents. We exemplify our theoretical construction in the Yukawa model in the ladder approximation, investigating in detail the current operator at the lowest nontrivial order of the quasipotential expansion of the Bethe-Salpeter equation. The explicit realization of the light-front form of the Ward-Takahashi identity is verified. We also show the relevance of instantaneous terms and of the pair contribution to the two-body current and the Ward-Takahashi identity.« less

  4. Rhetorical Savvy as Social Skill: Modeling Entrepreneur Identity Construction within Educational Content Management Systems

    ERIC Educational Resources Information Center

    Spartz, John M.

    2010-01-01

    This article focuses on one aspect of rhetorical training that writing instructors have an opportunity--if not an obligation--to inculcate (or at least introduce) in students studying to be entrepreneurs and taking their writing classes. Specifically, through the use of an open source Content Management System (CMS) (e.g., Drupal or Moodle),…

  5. Patient empowerment by the means of citizen-managed Electronic Health Records: web 2.0 health digital identity scenarios.

    PubMed

    Falcão-Reis, Filipa; Correia, Manuel E

    2010-01-01

    With the advent of more sophisticated and comprehensive healthcare information systems, system builders are becoming more interested in patient interaction and what he can do to help to improve his own health care. Information systems play nowadays a crucial and fundamental role in hospital work-flows, thus providing great opportunities to introduce and improve upon "patient empowerment" processes for the personalization and management of Electronic Health Records (EHRs). In this paper, we present a patient's privacy generic control mechanisms scenarios based on the Extended OpenID (eOID), a user centric digital identity provider previously developed by our group, which leverages a secured OpenID 2.0 infrastructure with the recently released Portuguese Citizen Card (CC) for secure authentication in a distributed health information environment. eOID also takes advantage of Oauth assertion based mechanisms to implement patient controlled secure qualified role based access to his EHR, by third parties.

  6. Balancing Fairness and Efficiency: The Impact of Identity-Blind and Identity-Conscious Accountability on Applicant Screening

    PubMed Central

    Self, William T.; Mitchell, Gregory; Mellers, Barbara A.; Tetlock, Philip E.; Hildreth, J. Angus D.

    2015-01-01

    This study compared two forms of accountability that can be used to promote diversity and fairness in personnel selections: identity-conscious accountability (holding decision makers accountable for which groups are selected) versus identity-blind accountability (holding decision makers accountable for making fair selections). In a simulated application screening process, undergraduate participants (majority female) sorted applicants under conditions of identity-conscious accountability, identity-blind accountability, or no accountability for an applicant pool in which white males either did or did not have a human capital advantage. Under identity-conscious accountability, participants exhibited pro-female and pro-minority bias, particularly in the white-male-advantage applicant pool. Under identity-blind accountability, participants exhibited no biases and candidate qualifications dominated interview recommendations. Participants exhibited greater resentment toward management under identity-conscious accountability. PMID:26660723

  7. Transition to Postgraduate Study: Postgraduate Ecological Systems and Identity

    ERIC Educational Resources Information Center

    Tobbell, Jane; O'Donnell, Victoria L.

    2013-01-01

    This paper explores and examines the distal and proximal systems which construct social science postgraduate study in the UK and analyses the emergent identities of postgraduate students as they negotiate the multiple and interacting practices in their transition to study. The data represent part of a one-year research project, funded by the…

  8. Online Identities and Social Networking

    NASA Astrophysics Data System (ADS)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  9. Author identities an interoperability problem solved by a collaborative solution

    NASA Astrophysics Data System (ADS)

    Fleischer, D.; Czerniak, A.; Schirnick, C.

    2012-12-01

    The identity of authors and data providers is crucial for personalized interoperability. The marketplace of available identifiers is packed and the right choice is getting more and more complicated. Even though there are more then 15 different systems available there are still some under development and proposed to come up by the end of 2012 ('PubMed Central Author ID' and ORCID). Data Management on a scale beyond the size of a single research institute but on the scale of a scientific site including a university with student education program needs to tackle this problem and so did the Kiel Data Management an Infrastructure. The main problem with the identities of researchers is the quite high frequency changes in positions during a scientist life. The required system needed to be a system that already contained the potential of preregistered people with their scientific publications from other countries, institutions and organizations. Scanning the author ID marketplace brought up, that there us a high risk of additional workload to the researcher itself or the administration due to the fact that individuals need to register an ID for themselves or the chosen register is not yet big enough to simply find the right entry. On the other hand libraries deal with authors and their publications now for centuries and they have high quality catalogs with person identities already available. Millions of records internationally mapped are available by collaboration with libraries and can be used in exactly the same scope. The international collaboration between libraries (VIAF) provides a mapping between libraries from the US, CA, UK, FR, GER and many more. The international library author identification system made it possible to actually reach at the first matching a success of 60% of all scientists. The additional advantage is that librarians can finalize the Identity system in a kind of background process. The Kiel Data Management Infrastructure initiated a web service

  10. A system management methodology for building successful resource management systems

    NASA Technical Reports Server (NTRS)

    Hornstein, Rhoda Shaller; Willoughby, John K.

    1989-01-01

    This paper presents a system management methodology for building successful resource management systems that possess lifecycle effectiveness. This methodology is based on an analysis of the traditional practice of Systems Engineering Management as it applies to the development of resource management systems. The analysis produced fifteen significant findings presented as recommended adaptations to the traditional practice of Systems Engineering Management to accommodate system development when the requirements are incomplete, unquantifiable, ambiguous and dynamic. Ten recommended adaptations to achieve operational effectiveness when requirements are incomplete, unquantifiable or ambiguous are presented and discussed. Five recommended adaptations to achieve system extensibility when requirements are dynamic are also presented and discussed. The authors conclude that the recommended adaptations to the traditional practice of Systems Engineering Management should be implemented for future resource management systems and that the technology exists to build these systems extensibly.

  11. Classification of attractors for systems of identical coupled Kuramoto oscillators

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Engelbrecht, Jan R.; Mirollo, Renato

    2014-03-15

    We present a complete classification of attractors for networks of coupled identical Kuramoto oscillators. In such networks, each oscillator is driven by the same first-order trigonometric function, with coefficients given by symmetric functions of the entire oscillator ensemble. For N≠3 oscillators, there are four possible types of attractors: completely synchronized fixed points or limit cycles, and fixed points or limit cycles where all but one of the oscillators are synchronized. The case N = 3 is exceptional; systems of three identical Kuramoto oscillators can also posses attracting fixed points or limit cycles with all three oscillators out of sync, as well asmore » chaotic attractors. Our results rely heavily on the invariance of the flow for such systems under the action of the three-dimensional group of Möbius transformations, which preserve the unit disc, and the analysis of the possible limiting configurations for this group action.« less

  12. Towards Interconnecting the Nordic Identity Federations

    ERIC Educational Resources Information Center

    Tveter, Walter M.; Melve, Ingrid; Linden, Mikael

    2007-01-01

    Purpose: This paper aims to outline considerations for trust management between established national identity federations in education and research. It also aims to discuss policy issues related to cross-federation and to compare existing academic identity federations. The paper seeks to investigate Nordic national federations and to introduce the…

  13. Design and Construction of an Entity Resolution System that Supports Entity Identity Information Management and Asserted Resolution

    ERIC Educational Resources Information Center

    Nelson, Eric Derrand

    2011-01-01

    This work describes the design and construction of an open source, entity resolution system that enables users to assign and maintain persistent identifiers for master data items. Two key features of this system that are not available in current ER systems and that make persistent identification possible are (1) The capture and management of…

  14. Social and psychological creativity in gay male midlife identity management.

    PubMed

    Hajek, Christopher

    2016-06-01

    This study utilizes a qualitative thematic analysis methodology and a social identity theory framework to explore ways in which early midlife gay men report enhancing their social identities through social and psychological creativity. Face-to-face, semi-structured interviews were conducted with forty early midlife gay men (aged 40-53) in four US cities. Men discussed the collective and individual essences of their age and gay identities, including attitudes, beliefs, and behaviours that they embraced to self-enhance at midlife. These discussions emphasized differences from the younger gay outgroup, often in the context of intergenerational interaction. Identified were three strategies (and seven substrategies) that summarized the ways that interviewees constructed their identities in the interest of self-enhancement, specifically in the context of intergenerational comparisons with younger gay men. These strategies may be considered as extensions to social creativity strategies presented in Tajfel and Turner's (Psychology of intergroup relations. Chicago, IL: Nelson, 1986: 7) social identity theory. © 2015 The British Psychological Society.

  15. Religiosity as identity: toward an understanding of religion from a social identity perspective.

    PubMed

    Ysseldyk, Renate; Matheson, Kimberly; Anisman, Hymie

    2010-02-01

    As a social identity anchored in a system of guiding beliefs and symbols, religion ought to serve a uniquely powerful function in shaping psychological and social processes. Religious identification offers a distinctive "sacred" worldview and "eternal" group membership, unmatched by identification with other social groups. Thus, religiosity might be explained, at least partially, by the marked cognitive and emotional value that religious group membership provides. The uniqueness of a positive social group, grounded in a belief system that offers epistemological and ontological certainty, lends religious identity a twofold advantage for the promotion of well-being. However, that uniqueness may have equally negative impacts when religious identity itself is threatened through intergroup conflict. Such consequences are illustrated by an examination of identities ranging from religious fundamentalism to atheism. Consideration of religion's dual function as a social identity and a belief system may facilitate greater understanding of the variability in its importance across individuals and groups.

  16. Social identity and worldview validation: the effects of ingroup identity primes and mortality salience on value endorsement.

    PubMed

    Halloran, Michael J; Kashima, Emiko S

    2004-07-01

    In this article, the authors report an investigation of the relationship between terror management and social identity processes by testing for the effects of social identity salience on worldview validation. Two studies, with distinct populations, were conducted to test the hypothesis that mortality salience would lead to worldview validation of values related to a salient social identity. In Study 1, reasonable support for this hypothesis was found with bicultural Aboriginal Australian participants (N = 97). It was found that thoughts of death led participants to validate ingroup and reject outgroup values depending on the social identity that had been made salient. In Study 2, when their student and Australian identities were primed, respectively, Anglo-Australian students (N = 119) validated values related to those identities, exclusively. The implications of the findings for identity-based worldview validation are discussed.

  17. Coupled transverse and torsional vibrations in a mechanical system with two identical beams

    NASA Astrophysics Data System (ADS)

    Vlase, S.; Marin, M.; Scutaru, M. L.; Munteanu, R.

    2017-06-01

    The paper aims to study a plane system with bars, with certain symmetries. Such problems can be encountered frequently in industry and civil engineering. Considerations related to the economy of the design process, constructive simplicity, cost and logistics make the use of identical parts a frequent procedure. The paper aims to determine the properties of the eigenvalues and eigenmodes for transverse and torsional vibrations of a mechanical system where two of the three component bars are identical. The determination of these properties allows the calculus effort and the computation time and thus increases the accuracy of the results in such matters.

  18. XSIM Final Report: Modelling the Past and Future of Identity Management for Scientific Collaborations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cowles, Robert; Jackson, Craig; Welch, Von

    The eXtreme Science Identity Management (XSIM1) research project: collected and analyzed real world data on virtual organization (VO) identity management (IdM) representing the last 15+ years of collaborative DOE science; constructed a descriptive VO IdM model based on that data; used the model and existing trends to project the direction for IdM in the 2020 timeframe; and provided guidance to scientific collaborations and resource providers that are implementing or seeking to improve IdM functionality. XSIM conducted over 20 semi­structured interviews of representatives from scientific collaborations and resource providers, both in the US and Europe; the interviewees supported diverse set ofmore » scientific collaborations and disciplines. We developed a definition of “trust,” a key concept in IdM, to understand how varying trust models affect where IdM functions are performed. The model identifies how key IdM data elements are utilized in collaborative scientific workflows, and it has the flexibility to describe past, present and future trust relationships and IdM implementations. During the funding period, we gave more than two dozen presentations to socialize our work, encourage feedback, and improve the model; we also published four refereed papers. Additionally, we developed, presented, and received favorable feedback on three white papers providing practical advice to collaborations and/or resource providers.« less

  19. The system-stabilizing role of identity management strategies: social creativity can undermine collective action for social change.

    PubMed

    Becker, Julia C

    2012-10-01

    Three studies were conducted to examine whether, in an event of negative distinctiveness, engaging in 1 of the 3 identity management strategies of social creativity can undermine group member's intentions to engage in collective action. Study 1a (N = 55) and Study 1b (N = 58) illustrated that selecting a new (complementary) comparison dimension undermined middle-class people's and women's intention to participate in collective action. Study 1c (N = 74) and Study 1d (N = 126) revealed that a downward comparison undermined collective action intentions among unemployed people and women. Study 1e (N = 69) and Study 1f (N = 110) showed that a positive redefinition of an externally imposed negative group attribute did not diminish collective action intentions among immigrants and women. Study 2 (N = 99) illustrated that an alternative operationalization of revaluation of the attribute, namely, downplaying the status-defining attribute, undermined collective action among students. Study 2 and Study 3 (N = 95) consistently illustrated that reduced levels of group-relative deprivation mediated the negative relation between the social creativity strategies and collective action intentions. Implications for social change are discussed.

  20. Securing the Global Airspace System Via Identity-Based Security

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  1. Crossing Borders: New Teachers Co-Constructing Professional Identity in Performative Times

    ERIC Educational Resources Information Center

    Wilkins, Chris; Busher, Hugh; Kakos, Michalis; Mohamed, Carmen; Smith, Joan

    2012-01-01

    This paper draws on a range of theoretical perspectives on the construction of new teachers' professional identity. It focuses particularly on the impact of the development in many national education systems of a performative culture of the management and regulation of teachers' work. Whilst the role of interactions with professional colleagues…

  2. "Managing by Not Managing": How Gay Engineering Students Manage Sexual Orientation Identity

    ERIC Educational Resources Information Center

    Hughes, Bryce E.

    2017-01-01

    From a social constructivist paradigm I explored the experiences of 7 openly gay engineering students to understand how, if at all, they made sense of the intersections between their engineering and sexual orientation identities. By eliciting stories through individual and focus group interviews, a narrative approach allowed me to capture the…

  3. Adolescents at School: Perspectives on Youth, Identity, and Education.

    ERIC Educational Resources Information Center

    Sadowski, Michael, Ed.

    This collection of papers suggests ways to foster the success of all students in schools and classrooms, focusing on the complex, changing identities young people manage while confronting the challenges of school. The papers are: "Introduction: Why Identity Matters at School" (Michael Sadowski); (1) "Identity and Possibility:…

  4. Brain systems mediating voice identity processing in blind humans.

    PubMed

    Hölig, Cordula; Föcker, Julia; Best, Anna; Röder, Brigitte; Büchel, Christian

    2014-09-01

    Blind people rely more on vocal cues when they recognize a person's identity than sighted people. Indeed, a number of studies have reported better voice recognition skills in blind than in sighted adults. The present functional magnetic resonance imaging study investigated changes in the functional organization of neural systems involved in voice identity processing following congenital blindness. A group of congenitally blind individuals and matched sighted control participants were tested in a priming paradigm, in which two voice stimuli (S1, S2) were subsequently presented. The prime (S1) and the target (S2) were either from the same speaker (person-congruent voices) or from two different speakers (person-incongruent voices). Participants had to classify the S2 as either a old or a young person. Person-incongruent voices (S2) compared with person-congruent voices elicited an increased activation in the right anterior fusiform gyrus in congenitally blind individuals but not in matched sighted control participants. In contrast, only matched sighted controls showed a higher activation in response to person-incongruent compared with person-congruent voices (S2) in the right posterior superior temporal sulcus. These results provide evidence for crossmodal plastic changes of the person identification system in the brain after visual deprivation. Copyright © 2014 Wiley Periodicals, Inc.

  5. Racial Identity Development in Middle School: A Case for School Counselor Individual and Systemic Intervention

    ERIC Educational Resources Information Center

    Akos, Patrick; Ellis, Cyrus Marcellus

    2008-01-01

    In middle school, counselors should promote optimal development as students navigate the formative stage of puberty. A search for identity is an important developmental task in early adolescence, but school counselors often neglect racial identity development. Through an actual case of an 8th-grade student, both individual and systemic strategies…

  6. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  7. Identity Formation in Career Development for Gifted Women.

    ERIC Educational Resources Information Center

    Phelps, Christine E.

    1991-01-01

    Necessary developmental tasks concerned with identity development of gifted college women include developing competence, managing emotions, developing autonomy, establishing identity, freeing interpersonal relationships, developing purpose, and developing integrity. These issues may be used as counseling interventions to raise career aspirations.…

  8. Conceptualizing Teacher Identity as a Complex Dynamic System: The Inner Dynamics of Transformations during a Practicum

    ERIC Educational Resources Information Center

    Henry, Alastair

    2016-01-01

    Currently, the inner dynamics of teacher identity transformations remain a "black box." Conceptualizing preservice teacher identity as a complex dynamic system, and the notion of "being someone who teaches" in dialogical terms as involving shifts between different teacher voices, the study investigates the dynamical processes…

  9. Fighting the Whole System: Dissociative Identity Disorder, Labeling Theory, and Iatrogenic Doubting.

    PubMed

    Floris, Jessica; McPherson, Susan

    2015-01-01

    This research examines how individuals diagnosed with dissociative identity disorder construe their experiences of being labeled with a contested diagnosis. Semistructured interviews were conducted in the United Kingdom with 5 women and 2 men diagnosed with dissociative identity disorder. A framework analysis was conducted. The analysis identified 2 overarching themes: diagnosis cross-examined and navigating care systems. The diagnosis appeared to be continually assessed by participants for its fit with symptoms, and the doubt among professionals seemed to be unhelpfully reflected in participants' attempts to understand and come to terms with their experiences. The findings are considered in light of labeling theory, the iatrogenic effects of professional doubt, and current debates concerning the reliability and validity of psychiatric diagnostic systems that have been reinvigorated by the publication of the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition.

  10. Staying in the Hood: Black Lesbian and Transgender Women and Identity Management in North Philadelphia.

    PubMed

    Brooks, Siobhan

    2016-12-01

    The concept Don't Ask, Don't Tell regarding Black LGBT sexuality in Black communities has been an acceptable form of identity management for Black LGBT people. In other words, Black LGBT people are accepted as long as they are not vocal about their sexuality. However, this is changing with the issue of gay marriage, which is creating a space where Black LGBT people are more open about their gender identity and sexuality in heterosexual Black spaces. This new form of openness allows Black LGBT people to "stay in" their communities, as opposed to coming out. In this article I examine how Black LGBT women in North Philadelphia stay in their communities: being politically active regarding LGBT issues, disengaging from LGBT issues, passing, and educating straight Black people about issues affecting the Black LGBT community. I conclude with implications of staying in and intersectionality among Black heterosexual and LGBT women fighting for social change.

  11. Reconceptualising "Identity Slippage": Additional Language Learning and (L2) Identity Development

    ERIC Educational Resources Information Center

    Armour, William

    2009-01-01

    This paper reconsiders the theoretical concept of "identity slippage" by considering a detailed exegesis of three model conversations taught to learners of Japanese as an additional language. To inform my analysis of these conversations and how they contribute to identity slippage, I have used the work of the systemic-functional linguist Jay Lemke…

  12. Identity Management and Mental Health Discourse in Social Media

    PubMed Central

    Pavalanathan, Umashanthi; De Choudhury, Munmun

    2015-01-01

    Social media is increasingly being adopted in health discourse. We examine the role played by identity in supporting discourse on socially stigmatized conditions. Specifically, we focus on mental health communities on reddit. We investigate the characteristics of mental health discourse manifested through reddit's characteristic ‘throwaway’ accounts, which are used as proxies of anonymity. For the purpose, we propose affective, cognitive, social, and linguistic style measures, drawing from literature in psychology. We observe that mental health discourse from throwaways is considerably disinhibiting and exhibits increased negativity, cognitive bias and self-attentional focus, and lowered self-esteem. Throwaways also seem to be six times more prevalent as an identity choice on mental health forums, compared to other reddit communities. We discuss the implications of our work in guiding mental health interventions, and in the design of online communities that can better cater to the needs of vulnerable populations. We conclude with thoughts on the role of identity manifestation on social media in behavioral therapy. PMID:27376158

  13. Identity Management and Mental Health Discourse in Social Media.

    PubMed

    Pavalanathan, Umashanthi; De Choudhury, Munmun

    2015-05-01

    Social media is increasingly being adopted in health discourse. We examine the role played by identity in supporting discourse on socially stigmatized conditions. Specifically, we focus on mental health communities on reddit. We investigate the characteristics of mental health discourse manifested through reddit's characteristic 'throwaway' accounts, which are used as proxies of anonymity. For the purpose, we propose affective, cognitive, social, and linguistic style measures, drawing from literature in psychology. We observe that mental health discourse from throwaways is considerably disinhibiting and exhibits increased negativity, cognitive bias and self-attentional focus, and lowered self-esteem. Throwaways also seem to be six times more prevalent as an identity choice on mental health forums, compared to other reddit communities. We discuss the implications of our work in guiding mental health interventions, and in the design of online communities that can better cater to the needs of vulnerable populations. We conclude with thoughts on the role of identity manifestation on social media in behavioral therapy.

  14. Multi-vehicle detection with identity awareness using cascade Adaboost and Adaptive Kalman filter for driver assistant system.

    PubMed

    Wang, Baofeng; Qi, Zhiquan; Chen, Sizhong; Liu, Zhaodu; Ma, Guocheng

    2017-01-01

    Vision-based vehicle detection is an important issue for advanced driver assistance systems. In this paper, we presented an improved multi-vehicle detection and tracking method using cascade Adaboost and Adaptive Kalman filter(AKF) with target identity awareness. A cascade Adaboost classifier using Haar-like features was built for vehicle detection, followed by a more comprehensive verification process which could refine the vehicle hypothesis in terms of both location and dimension. In vehicle tracking, each vehicle was tracked with independent identity by an Adaptive Kalman filter in collaboration with a data association approach. The AKF adaptively adjusted the measurement and process noise covariance through on-line stochastic modelling to compensate the dynamics changes. The data association correctly assigned different detections with tracks using global nearest neighbour(GNN) algorithm while considering the local validation. During tracking, a temporal context based track management was proposed to decide whether to initiate, maintain or terminate the tracks of different objects, thus suppressing the sparse false alarms and compensating the temporary detection failures. Finally, the proposed method was tested on various challenging real roads, and the experimental results showed that the vehicle detection performance was greatly improved with higher accuracy and robustness.

  15. Multi-vehicle detection with identity awareness using cascade Adaboost and Adaptive Kalman filter for driver assistant system

    PubMed Central

    Wang, Baofeng; Qi, Zhiquan; Chen, Sizhong; Liu, Zhaodu; Ma, Guocheng

    2017-01-01

    Vision-based vehicle detection is an important issue for advanced driver assistance systems. In this paper, we presented an improved multi-vehicle detection and tracking method using cascade Adaboost and Adaptive Kalman filter(AKF) with target identity awareness. A cascade Adaboost classifier using Haar-like features was built for vehicle detection, followed by a more comprehensive verification process which could refine the vehicle hypothesis in terms of both location and dimension. In vehicle tracking, each vehicle was tracked with independent identity by an Adaptive Kalman filter in collaboration with a data association approach. The AKF adaptively adjusted the measurement and process noise covariance through on-line stochastic modelling to compensate the dynamics changes. The data association correctly assigned different detections with tracks using global nearest neighbour(GNN) algorithm while considering the local validation. During tracking, a temporal context based track management was proposed to decide whether to initiate, maintain or terminate the tracks of different objects, thus suppressing the sparse false alarms and compensating the temporary detection failures. Finally, the proposed method was tested on various challenging real roads, and the experimental results showed that the vehicle detection performance was greatly improved with higher accuracy and robustness. PMID:28296902

  16. A qualitative investigation of masculine identity after traumatic brain injury.

    PubMed

    MacQueen, Ruth; Fisher, Paul; Williams, Deirdre

    2018-04-30

    Men are twice as likely as women to experience a traumatic brain injury (TBI), suggesting that aspects of masculine identity contribute to how people acquire their brain injuries. Research also suggests that masculine identity impacts on how people manage their health experiences. The current study aimed to explore the experience of masculine identity following TBI. Individual interviews were conducted with 10 men aged 21-67 years who had experienced a TBI. All were living in the community. Interpretative phenomenological analysis was used to consider lived experiences and to explore the meaning of the TBI experience in relation to masculine identity. Three superordinate themes emerged from the analysis: doing life and relationships differently, self-perceptions and the perceived view of others, and managing the impact of TBI as a man. These themes are considered in relation to how participants' experiences interacted with dominant social ideals of masculine identity. The findings highlighted how masculine identity may be a valuable aspect of self in considering threats to and reconstruction of self-identity after TBI. Aspects of gender identity should be considered in order to promote engagement, support adjustment and achieve meaningful outcomes in rehabilitation.

  17. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    PubMed

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  18. Relationship between self-confidence and sex role identity among managerial women and men.

    PubMed

    Chusmir, L H; Koberg, C S

    1991-12-01

    The self-confidence and sex role identities of 437 American female and male managers were examined by using three subscales of the Adjective Check List. Results showed that, contrary to stereotypes and older research, female and male managers were strikingly similar. Women and men with cross-sex role identities showed lower levels of self-confidence than those did with androgynous orientations; high self-confidence was linked with masculine and androgynous orientations. The managers were not significantly different in self-confidence when demographic variables and sex role identity were held constant. Sex role identity (but not gender) was a major factor in the level of self-confidence.

  19. Is Identical Really Identical? An Investigation of Equivalency Theory and Online Learning

    ERIC Educational Resources Information Center

    Lapsley, Ruth; Kulik, Brian; Moody, Rex; Arbaugh, J. B.

    2008-01-01

    This study investigates the validity of equivalency theory among 63 students by comparing two introductory upper-division human resource management courses: one taught online, the other in a traditional classroom. Commonalities included same term, same professor, and identical assignments/tests in the same order, thus allowing a direct comparison…

  20. A study of multibiometric traits of identical twins

    NASA Astrophysics Data System (ADS)

    Sun, Zhenan; Paulino, Alessandra A.; Feng, Jianjiang; Chai, Zhenhua; Tan, Tieniu; Jain, Anil K.

    2010-04-01

    The increase in twin births has created a requirement for biometric systems to accurately determine the identity of a person who has an identical twin. The discriminability of some of the identical twin biometric traits, such as fingerprints, iris, and palmprints, is supported by anatomy and the formation process of the biometric characteristic, which state they are different even in identical twins due to a number of random factors during the gestation period. For the first time, we collected multiple biometric traits (fingerprint, face, and iris) of 66 families of twins, and we performed unimodal and multimodal matching experiments to assess the ability of biometric systems in distinguishing identical twins. Our experiments show that unimodal finger biometric systems can distinguish two different persons who are not identical twins better than they can distinguish identical twins; this difference is much larger in the face biometric system and it is not significant in the iris biometric system. Multimodal biometric systems that combine different units of the same biometric modality (e.g. multiple fingerprints or left and right irises.) show the best performance among all the unimodal and multimodal biometric systems, achieving an almost perfect separation between genuine and impostor distributions.

  1. Architecture for the Next Generation System Management Tools

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gallard, Jerome; Lebre, I Adrien; Morin, Christine

    2011-01-01

    To get more results or greater accuracy, computational scientists execute their applications on distributed computing platforms such as Clusters, Grids and Clouds. These platforms are different in terms of hardware and software resources as well as locality: some span across multiple sites and multiple administrative domains whereas others are limited to a single site/domain. As a consequence, in order to scale their applica- tions up the scientists have to manage technical details for each target platform. From our point of view, this complexity should be hidden from the scientists who, in most cases, would prefer to focus on their researchmore » rather than spending time dealing with platform configuration concerns. In this article, we advocate for a system management framework that aims to automatically setup the whole run-time environment according to the applications needs. The main difference with regards to usual approaches is that they generally only focus on the software layer whereas we address both the hardware and the software expecta- tions through a unique system. For each application, scientists describe their requirements through the definition of a Virtual Platform (VP) and a Virtual System Environment (VSE). Relying on the VP/VSE definitions, the framework is in charge of: (i) the configuration of the physical infrastructure to satisfy the VP requirements, (ii) the setup of the VP, and (iii) the customization of the execution environment (VSE) upon the former VP. We propose a new formalism that the system can rely upon to successfully perform each of these three steps without burdening the user with the specifics of the configuration for the physical resources, and system management tools. This formalism leverages Goldberg s theory for recursive virtual machines by introducing new concepts based on system virtualization (identity, partitioning, aggregation) and emulation (simple, abstraction). This enables the definition of complex VP

  2. Revocable identity-based proxy re-signature against signing key exposure.

    PubMed

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  3. Identity Formation in Adolescents from Italian, Mixed, and Migrant Families

    ERIC Educational Resources Information Center

    Crocetti, Elisabetta; Fermani, Alessandra; Pojaghi, Barbara; Meeus, Wim

    2011-01-01

    The purpose of this study was to compare identity formation in adolescents from Italian (n = 261), mixed (n = 100), and migrant families (n =148). Participants completed the Italian version of the Utrecht-Management of Identity Commitments Scale that assesses identity processes in educational and relational domains. Within a variable-centered…

  4. Tomboy as protective identity.

    PubMed

    Craig, Traci; Lacroix, Jessica

    2011-01-01

    The tomboy in contemporary U.S. culture is a complex identity, providing meaning to many girls and women. In this article, we argue tomboy as a gendered social identity also provides temporary "protections" to girls and women in three main ways. First, tomboy identity can excuse masculine-typed behavior in girls and women and, in doing so, protect women from presumptions about sexual reputation and sexual orientation. Second, tomboy identities can provide some protection for lesbian girls and women who prefer to not divulge their sexual orientation. And, third, tomboy identity can gain women limited privilege to spaces for which masculinity is an unspoken requirement. The temporary nature of the protections provided to tomboys undermines the ability of tomboys to truly transcend the binary gender system.

  5. Spanning Professional and Academic: The Changing Identity of Professional Administrators and Managers in Hong Kong's Higher Education Context

    ERIC Educational Resources Information Center

    Cheng, Tak-Iak

    2017-01-01

    This paper builds on Whitchurch's notion of the "blended professional" which aims to examine how mixed professional activity affects professional administrators and managers' identity disposition in universities in Hong Kong. In response to complex missions and demands of contemporary higher education globally, diverse projected-oriented…

  6. Critical look at physics identity: An operationalized framework for examining race and physics identity

    NASA Astrophysics Data System (ADS)

    Hyater-Adams, Simone; Fracchiolla, Claudia; Finkelstein, Noah; Hinko, Kathleen

    2018-06-01

    Studies on physics identity are appearing more frequently and often responding to increased awareness of the underrepresentation of students of color in physics. In our broader research, we focus our efforts on understanding how racial identity and physics identity are negotiated throughout the experiences of Black physicists. In this paper, we present a Critical Physics Identity framework that can be used to examine racialized physics identity and demonstrate the utility of this framework by analyzing interviews with four physicists. Our framework draws from prior constructs of physics identity and racialized identity and provides operational definitions of six interacting dimensions. In this paper, we present the operationalized constructs, demonstrate how we use these constructs to code narrative data, as well as outline three methods of analysis that may be applied to study systems and structures and their influences on the experiences of Black students.

  7. Current management of male-to-female gender identity disorder in the UK.

    PubMed

    Tugnet, Nicola; Goddard, Jonathan Charles; Vickery, Richard M; Khoosal, Deenesh; Terry, Tim R

    2007-10-01

    Gender identity disorder (GID), or transsexualism as it is more commonly known, is a highly complex clinical entity. Although the exact aetiology of GID is unknown, several environmental, genetic and anatomical theories have been described. The diagnosis of GID can be a difficult process but is established currently using standards of care as defined by the Harry Benjamin International Gender Dysphoria Association. Patients go through extensive psychiatric assessment, including the Real Life Experience, which entails living in the desired gender role 24 h a day for a minimum period of 12 months. The majority of GID patients will eventually go on to have gender realignment surgery, which includes feminising genitoplasty. The clinical features, diagnostic approach and management of male-to-female GID in the UK are reviewed, including the behavioural, psychological and surgical aspects.

  8. Personal and Interpersonal Value System, Self-Perception and Identity of Spanish Nurses: A Cross-Sectional Study

    ERIC Educational Resources Information Center

    Losa Iglesias, Marta Elena; de Bengoa Vallejo, Ricardo Becerro

    2011-01-01

    The aim of this research is to identify the predominant values system among a sample of Spanish nurses, to identify how values are tied to professional nursing identity and determine differences in values and identity between socio-demographic variables as a gender, citizenship and/or nursing service. Cross-sectional study was performed with a…

  9. An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter

    PubMed Central

    Qin, Zhongyuan; Zhang, Xinshuai; Feng, Kerong; Zhang, Qunfang; Huang, Jie

    2014-01-01

    With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead. PMID:25264955

  10. Two barriers to realizing the benefits of biometrics: a chain perspective on biometrics and identity fraud as biometrics' real challenge

    NASA Astrophysics Data System (ADS)

    Grijpink, Jan

    2004-06-01

    Along at least twelve dimensions biometric systems might vary. We need to exploit this variety to manoeuvre biometrics into place to be able to realise its social potential. Subsequently, two perspectives on biometrics are proposed revealing that biometrics will probably be ineffective in combating identity fraud, organised crime and terrorism: (1) the value chain perspective explains the first barrier: our strong preference for large scale biometric systems for general compulsory use. These biometric systems cause successful infringements to spread unnoticed. A biometric system will only function adequately if biometrics is indispensable for solving the dominant chain problem. Multi-chain use of biometrics takes it beyond the boundaries of good manageability. (2) the identity fraud perspective exposes the second barrier: our traditional approach to identity verification. We focus on identity documents, neglecting the person and the situation involved. Moreover, western legal cultures have made identity verification procedures known, transparent, uniform and predictable. Thus, we have developed a blind spot to identity fraud. Biometrics provides good potential to better checking persons, but will probably be used to enhance identity documents. Biometrics will only pay off if it confronts the identity fraudster with less predictable verification processes and more risks of his identity fraud being spotted. Standardised large scale applications of biometrics for general compulsory use without countervailing measures will probably produce the reverse. This contribution tentatively presents a few headlines for an overall biometrics strategy that could better resist identity fraud.

  11. [Gender identity, a factor of inequality forgotten by Spanish health information systems].

    PubMed

    Gil-Borrelli, Christian; Velasco, César; Martí-Pastor, Marc; Latasa, Pello

    The Spanish Health Information System (HIS) collects health information. Trans people have poorer health status. This paper aimed to assess the adequacy of the HIS to collect the health data on trans individuals. The HIS sources available in the Statistical Portal of the National Health System were reviewed. The sources containing population health data were selected. The variables "sex" and "gender identity" were searched. Nineteen sources were identified. In all of them the variable "sex" was found, whereas "gender identify" did not appear in any of the 19. In two sources, the variable "sex" allowed values of "transsexual". The SIS contains little information regarding gender identity. This leads to the invisibility of trans people in Spanish health statistics. Obtaining this information would allow for a better understanding of the barriers to health care access, and the health needs of one of the most discriminated groups in our society. Copyright © 2017 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  12. Who do we think we are? Analysing the content and form of identity work in the English National Health Service.

    PubMed

    McDermott, Imelda; Checkland, Kath; Harrison, Stephen; Snow, Stephanie; Coleman, Anna

    2013-01-01

    The language used by National Health Service (NHS) "commissioning" managers when discussing their roles and responsibilities can be seen as a manifestation of "identity work", defined as a process of identifying. This paper aims to offer a novel approach to analysing "identity work" by triangulation of multiple analytical methods, combining analysis of the content of text with analysis of its form. Fairclough's discourse analytic methodology is used as a framework. Following Fairclough, the authors use analytical methods associated with Halliday's systemic functional linguistics. While analysis of the content of interviews provides some information about NHS Commissioners' perceptions of their roles and responsibilities, analysis of the form of discourse that they use provides a more detailed and nuanced view. Overall, the authors found that commissioning managers have a higher level of certainty about what commissioning is not rather than what commissioning is; GP managers have a high level of certainty of their identity as a GP rather than as a manager; and both GP managers and non-GP managers oscillate between multiple identities depending on the different situations they are in. This paper offers a novel approach to triangulation, based not on the usual comparison of multiple data sources, but rather based on the application of multiple analytical methods to a single source of data. This paper also shows the latent uncertainty about the nature of commissioning enterprise in the English NHS.

  13. Identity threat at work: how social identity threat and situational cues contribute to racial and ethnic disparities in the workplace.

    PubMed

    Emerson, Katherine T U; Murphy, Mary C

    2014-10-01

    Significant disparities remain between racial and ethnic minorities' and Whites' experiences of American workplaces. Traditional prejudice and discrimination approaches explain these gaps in hiring, promotion, satisfaction, and well-being by pointing to the prejudice of people within organizations such as peers, managers, and executives. Grounded in social identity threat theory, this theoretical review instead argues that particular situational cues-often communicated by well-meaning, largely unprejudiced employees and managers-signal to stigmatized groups whether their identity is threatened and devalued or respected and affirmed. First, we provide an overview of how identity threat shapes the psychological processes of racial and ethnic minorities by heightening vigilance to certain situational cues in the workplace. Next, we outline several of these cues and their role in creating and sustaining perceptions of identity threat (or safety). Finally, we provide empirically grounded suggestions that organizations may use to increase identity safety among their employees of color. Taken together, the research demonstrates how situational cues contribute to disparate psychological experiences for racial and ethnic minorities at work, and suggests that by altering threatening cues, organizations may create more equitable, respectful, and inclusive environments where all people may thrive. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  14. Operations management system

    NASA Technical Reports Server (NTRS)

    Brandli, A. E.; Eckelkamp, R. E.; Kelly, C. M.; Mccandless, W.; Rue, D. L.

    1990-01-01

    The objective of an operations management system is to provide an orderly and efficient method to operate and maintain aerospace vehicles. Concepts are described for an operations management system and the key technologies are highlighted which will be required if this capability is brought to fruition. Without this automation and decision aiding capability, the growing complexity of avionics will result in an unmanageable workload for the operator, ultimately threatening mission success or survivability of the aircraft or space system. The key technologies include expert system application to operational tasks such as replanning, equipment diagnostics and checkout, global system management, and advanced man machine interfaces. The economical development of operations management systems, which are largely software, will require advancements in other technological areas such as software engineering and computer hardware.

  15. Revocable identity-based proxy re-signature against signing key exposure

    PubMed Central

    Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification. PMID:29579125

  16. Why do I dread looking old?: A test of social identity theory, terror management theory, and the double standard of aging.

    PubMed

    Chonody, Jill M; Teater, Barbra

    2016-01-01

    Outward appearance is one of the means by which age is determined, and fear of looking old may stem from fears about social identity and death. This study explored how social identity theory and terror management theory may help to explain the dread of looking old. University students from the United States, England, and Australia (N = 1,042) completed a questionnaire regarding their attitudes about aging and older adults. Results indicated that sex, age, beliefs about personal aging, and death anxiety explained 30.4% of the variance for participants' dread of looking old. Theoretical hypotheses were supported by our findings.

  17. Current management of male‐to‐female gender identity disorder in the UK

    PubMed Central

    Tugnet, Nicola; Goddard, Jonathan Charles; Vickery, Richard M; Khoosal, Deenesh; Terry, Tim R

    2007-01-01

    Gender identity disorder (GID), or transsexualism as it is more commonly known, is a highly complex clinical entity. Although the exact aetiology of GID is unknown, several environmental, genetic and anatomical theories have been described. The diagnosis of GID can be a difficult process but is established currently using standards of care as defined by the Harry Benjamin International Gender Dysphoria Association. Patients go through extensive psychiatric assessment, including the Real Life Experience, which entails living in the desired gender role 24 h a day for a minimum period of 12 months. The majority of GID patients will eventually go on to have gender realignment surgery, which includes feminising genitoplasty. The clinical features, diagnostic approach and management of male‐to‐female GID in the UK are reviewed, including the behavioural, psychological and surgical aspects. PMID:17916872

  18. Lighting system with thermal management system

    DOEpatents

    Arik, Mehmet; Weaver, Stanton Earl; Stecher, Thomas Elliot; Seeley, Charles Erklin; Kuenzler, Glenn Howard; Wolfe, Jr., Charles Franklin; Utturkar, Yogen Vishwas; Sharma, Rajdeep; Prabhakaran, Satish; Icoz, Tunc

    2015-02-24

    Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system is configured to provide an air flow, such as a unidirectional air flow, through the housing structure in order to cool the light source. The driver electronics are configured to provide power to each of the light source and the thermal management system.

  19. Lighting system with thermal management system

    DOEpatents

    Arik, Mehmet; Weaver, Stanton Earl; Stecher, Thomas Elliot; Seeley, Charles Erklin; Kuenzler, Glenn Howard; Wolfe, Jr., Charles Franklin; Utturkar, Yogen Vishwas; Sharma, Rajdeep; Prabhakaran, Satish; Icoz, Tunc

    2015-08-25

    Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system is configured to provide an air flow, such as a unidirectional air flow, through the housing structure in order to cool the light source. The driver electronics are configured to provide power to each of the light source and the thermal management system.

  20. Lighting system with thermal management system

    DOEpatents

    Arik, Mehmet; Weaver, Stanton; Stecher, Thomas; Seeley, Charles; Kuenzler, Glenn; Wolfe, Jr., Charles; Utturkar, Yogen; Sharma, Rajdeep; Prabhakaran, Satish; Icoz, Tunc

    2013-05-07

    Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system is configured to provide an air flow, such as a unidirectional air flow, through the housing structure in order to cool the light source. The driver electronics are configured to provide power to each of the light source and the thermal management system.

  1. Lighting system with thermal management system

    DOEpatents

    Arik, Mehmet; Weaver, Stanton Earl; Stecher, Thomas Elliot; Seeley, Charles Erklin; Kuenzler, Glenn Howard; Wolfe, Jr, Charles Franklin; Utturkar, Yogen Vishwas; Sharma, Rajdeep; Prabhakaran, Satish; Icoz, Tunc

    2016-10-11

    Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system is configured to provide an air flow, such as a unidirectional air flow, through the housing structure in order to cool the light source. The driver electronics are configured to provide power to each of the light source and the thermal management system.

  2. Managing hybrid marketing systems.

    PubMed

    Moriarty, R T; Moran, U

    1990-01-01

    As competition increases and costs become critical, companies that once went to market only one way are adding new channels and using new methods - creating hybrid marketing systems. These hybrid marketing systems hold the promise of greater coverage and reduced costs. But they are also hard to manage; they inevitably raise questions of conflict and control: conflict because marketing units compete for customers; control because new indirect channels are less subject to management authority. Hard as they are to manage, however, hybrid marketing systems promise to become the dominant design, replacing the "purebred" channel strategy in all kinds of businesses. The trick to managing the hybrid is to analyze tasks and channels within and across a marketing system. A map - the hybrid grid - can help managers make sense of their hybrid system. What the chart reveals is that channels are not the basic building blocks of a marketing system; marketing tasks are. The hybrid grid forces managers to consider various combinations of channels and tasks that will optimize both cost and coverage. Managing conflict is also an important element of a successful hybrid system. Managers should first acknowledge the inevitability of conflict. Then they should move to bound it by creating guidelines that spell out which customers to serve through which methods. Finally, a marketing and sales productivity (MSP) system, consisting of a central marketing database, can act as the central nervous system of a hybrid marketing system, helping managers create customized channels and service for specific customer segments.

  3. Identity-specific motivation: How distinct identities direct self-regulation across distinct situations.

    PubMed

    Browman, Alexander S; Destin, Mesmin; Molden, Daniel C

    2017-12-01

    Research on self-regulation has traditionally emphasized that people's thoughts and actions are guided by either (a) domain-general motivations that emerge from a cumulative history of life experiences, or (b) situation-specific motivations that emerge in immediate response to the incentives present in a particular context. However, more recent studies have illustrated the importance of understanding the interplay between such domain-general and situation-specific motivations across the types of contexts people regularly encounter. The present research, therefore, expands existing perspectives on self-regulation by investigating how people's identities -the internalized roles, relationships, and social group memberships that define who they are-systemically guide when and how different domain-general motivations are activated within specific types of situations. Using the motivational framework described by regulatory focus theory (Higgins, 1997), Studies 1 and 2 demonstrate that people indeed have distinct, identity-specific motivations that uniquely influence their current self-regulation when such identities are active. Studies 3-5 then begin to explore how identity-specific motivations are situated within people's larger self-concept. Studies 3a and 3b demonstrate that the less compatible people's specific identities, the more distinct are the motivations connected to those identities. Studies 4-5 then provide some initial, suggestive evidence that identity-specific motivations are not a separate, superordinate feature of people's identities that then alter how they pursue any subordinate, identity-relevant traits, but instead that such motivations emerge from the cumulative motivational significance of the subordinate traits to which the identities themselves become attached. Implications for understanding the role of the self-concept in self-regulation are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  4. A Complex Dynamic Systems Perspective on Identity and Its Development: The Dynamic Systems Model of Role Identity

    ERIC Educational Resources Information Center

    Kaplan, Avi; Garner, Joanna K.

    2017-01-01

    Current prominent models of identity face challenges in bridging across divergent perspectives and apparent dichotomies such as personal or social-collective, conscious or unconscious, and epigenetic or discursive-relational, and affording pursuit of research questions that allows integrative answers. This article presents a coherent theoretical…

  5. Information Security Management - Part Of The Integrated Management System

    NASA Astrophysics Data System (ADS)

    Manea, Constantin Adrian

    2015-07-01

    The international management standards allow their integrated approach, thereby combining aspects of particular importance to the activity of any organization, from the quality management systems or the environmental management of the information security systems or the business continuity management systems. Although there is no national or international regulation, nor a defined standard for the Integrated Management System, the need to implement an integrated system occurs within the organization, which feels the opportunity to integrate the management components into a cohesive system, in agreement with the purpose and mission publicly stated. The issues relating to information security in the organization, from the perspective of the management system, raise serious questions to any organization in the current context of electronic information, reason for which we consider not only appropriate but necessary to promote and implement an Integrated Management System Quality - Environment - Health and Operational Security - Information Security

  6. A computational model of the development of separate representations of facial identity and expression in the primate visual system.

    PubMed

    Tromans, James Matthew; Harris, Mitchell; Stringer, Simon Maitland

    2011-01-01

    Experimental studies have provided evidence that the visual processing areas of the primate brain represent facial identity and facial expression within different subpopulations of neurons. For example, in non-human primates there is evidence that cells within the inferior temporal gyrus (TE) respond primarily to facial identity, while cells within the superior temporal sulcus (STS) respond to facial expression. More recently, it has been found that the orbitofrontal cortex (OFC) of non-human primates contains some cells that respond exclusively to changes in facial identity, while other cells respond exclusively to facial expression. How might the primate visual system develop physically separate representations of facial identity and expression given that the visual system is always exposed to simultaneous combinations of facial identity and expression during learning? In this paper, a biologically plausible neural network model, VisNet, of the ventral visual pathway is trained on a set of carefully-designed cartoon faces with different identities and expressions. The VisNet model architecture is composed of a hierarchical series of four Self-Organising Maps (SOMs), with associative learning in the feedforward synaptic connections between successive layers. During learning, the network develops separate clusters of cells that respond exclusively to either facial identity or facial expression. We interpret the performance of the network in terms of the learning properties of SOMs, which are able to exploit the statistical indendependence between facial identity and expression.

  7. Robust encoding of stimulus identity and concentration in the accessory olfactory system.

    PubMed

    Arnson, Hannah A; Holy, Timothy E

    2013-08-14

    Sensory systems represent stimulus identity and intensity, but in the neural periphery these two variables are typically intertwined. Moreover, stable detection may be complicated by environmental uncertainty; stimulus properties can differ over time and circumstance in ways that are not necessarily biologically relevant. We explored these issues in the context of the mouse accessory olfactory system, which specializes in detection of chemical social cues and infers myriad aspects of the identity and physiological state of conspecifics from complex mixtures, such as urine. Using mixtures of sulfated steroids, key constituents of urine, we found that spiking responses of individual vomeronasal sensory neurons encode both individual compounds and mixtures in a manner consistent with a simple model of receptor-ligand interactions. Although typical neurons did not accurately encode concentration over a large dynamic range, from population activity it was possible to reliably estimate the log-concentration of pure compounds over several orders of magnitude. For binary mixtures, simple models failed to accurately segment the individual components, largely because of the prevalence of neurons responsive to both components. By accounting for such overlaps during model tuning, we show that, from neuronal firing, one can accurately estimate log-concentration of both components, even when tested across widely varying concentrations. With this foundation, the difference of logarithms, log A - log B = log A/B, provides a natural mechanism to accurately estimate concentration ratios. Thus, we show that a biophysically plausible circuit model can reconstruct concentration ratios from observed neuronal firing, representing a powerful mechanism to separate stimulus identity from absolute concentration.

  8. Towards knowledge-based systems in clinical practice: development of an integrated clinical information and knowledge management support system.

    PubMed

    Kalogeropoulos, Dimitris A; Carson, Ewart R; Collinson, Paul O

    2003-09-01

    Given that clinicians presented with identical clinical information will act in different ways, there is a need to introduce into routine clinical practice methods and tools to support the scientific homogeneity and accountability of healthcare decisions and actions. The benefits expected from such action include an overall reduction in cost, improved quality of care, patient and public opinion satisfaction. Computer-based medical data processing has yielded methods and tools for managing the task away from the hospital management level and closer to the desired disease and patient management level. To this end, advanced applications of information and disease process modelling technologies have already demonstrated an ability to significantly augment clinical decision making as a by-product. The wide-spread acceptance of evidence-based medicine as the basis of cost-conscious and concurrently quality-wise accountable clinical practice suffices as evidence supporting this claim. Electronic libraries are one-step towards an online status of this key health-care delivery quality control environment. Nonetheless, to date, the underlying information and knowledge management technologies have failed to be integrated into any form of pragmatic or marketable online and real-time clinical decision making tool. One of the main obstacles that needs to be overcome is the development of systems that treat both information and knowledge as clinical objects with same modelling requirements. This paper describes the development of such a system in the form of an intelligent clinical information management system: a system which at the most fundamental level of clinical decision support facilitates both the organised acquisition of clinical information and knowledge and provides a test-bed for the development and evaluation of knowledge-based decision support functions.

  9. Harvesting influences functional identity and diversity over time in forests of the northeastern U.S.A.

    Treesearch

    M.T. Curzon; A.W. D' Amato; S. Fraver; B.J. Palik; A. Bottero; J.R. Foster; K.E. Gleason

    2017-01-01

    Concern over global environmental change and associated uncertainty has given rise to greater emphasis on fostering resilience through forest management. We examined the impact of standard silvicultural systems (including clearcutting, shelterwood, and selection) compared with unharvested controls on tree functional identity and functional diversity in three forest...

  10. Expanding the disaster risk management framework: Measuring the constructed level of national identity as a factor of political risk

    PubMed Central

    2016-01-01

    Political risk is identified as a dominant risk category of disaster risk management (DRM) which could negatively affect the success of those measures implemented to reduce disaster risk. Key to political risk is the construct of national identity which, if poorly constructed, could greatly contribute to political risk. This article proposed a tool to measure the construct of national identity and to provide recommendations to strengthen the construct in order to mitigate the exacerbating influence it may have on political risk and ultimately on DRM. The design of the measurement tool consisted of a mixed methodological approach employing both quantitative and qualitative data. The data collection instruments included a literature review (which is shortly provided in the previous sections) and an empirical study that utilised data obtained through structured questionnaires. Although the results of the proposed measuring instrument did not include a representative sample of all the cultures in South Africa, the results alluded to different levels for the construction of national identity among black and white respondents, possibly because of different ideological expectations among these groups. The results of the study should be considered as a validation of the measuring tool and not necessarily of the construct of national identity in South Africa. The measuring tool is thus promising for future studies to reduce political risk and ultimately disaster risk.

  11. A systems engineering management approach to resource management applications

    NASA Technical Reports Server (NTRS)

    Hornstein, Rhoda Shaller

    1989-01-01

    The author presents a program management response to the following question: How can the traditional practice of systems engineering management, including requirements specification, be adapted, enhanced, or modified to build future planning and scheduling systems for effective operations? The systems engineering management process, as traditionally practiced, is examined. Extensible resource management systems are discussed. It is concluded that extensible systems are a partial solution to problems presented by requirements that are incomplete, partially immeasurable, and often dynamic. There are positive indications that resource management systems have been characterized and modeled sufficiently to allow their implementation as extensible systems.

  12. Developing a workable teacher identity: Building and negotiating identity within a professional network

    NASA Astrophysics Data System (ADS)

    Rostock, Roseanne

    The challenge of attracting and retaining the next generation of teachers who are skilled and committed to meeting the growing demands of the profession is of increasing concern to researchers and policy makers, particularly since 45--50% of beginning teachers leave the profession within five years (Ingersoll & Smith, 2003). Reasons for such attrition include compensation, status and working conditions; however, there is growing evidence that a critical factor in new teacher retention hinges on teachers' ability to accomplish the difficult task of forming a workable professional identity in the midst of competing discourses about teaching (Alsup, 2006; Britzman, 2003). There is little research on professional identity development among those beginning teachers at highest risk for attrition (secondary math and science teachers, and those with strong academic backgrounds). This study explores the professional identity development of early-career math and science teachers who are part of the Knowles Science Teaching Foundation's (KSTF) teaching fellowship program, an external support network that aims to address many of the issues leading to high attrition among this particular population of teachers. Using narrative research methods, I examine three case studies of beginning teachers, exploring how they construct professional identity in relation to various discourse communities and negotiate tensions across multiple discourses. The cases identify both dominant discourses and counter-discourses that the teachers draw upon for important identity development resources. They also demonstrate that the way a teacher manages tensions across competing discourses is important to how well one can negotiate a workable professional identity. In particular, they emphasize the importance of engaging in borderland discourses (Gee, 1996) as a way of taking agency in one's own identity development as well as in transforming one's discourse communities. These cases shed light on how

  13. The reconstruction of narrative identity during mental health recovery: a complex adaptive systems perspective.

    PubMed

    Kerr, Douglas J R; Crowe, Trevor P; Oades, Lindsay G

    2013-06-01

    1) to understand the reconstruction of narrative identity during mental health recovery using a complex adaptive systems perspective, 2) to address the need for alternative approaches that embrace the complexities of health care. A narrative review of published literature was conducted. A complex adaptive systems perspective offers a framework and language that can assist individuals to make sense of their experiences and reconstruct their narratives during an often erratic and uncertain life transition. It is a novel research direction focused on a critical area of recovery and addresses the need for alternative approaches that embrace the complexities of health care. A complexity research approach to narrative identity reconstruction is valuable. It is an accessible model for addressing the complexities of recovery and may underpin the development of simple, practical recovery coaching tools. (PsycINFO Database Record (c) 2013 APA, all rights reserved).

  14. System and method for simultaneously collecting serial number information from numerous identity tags

    DOEpatents

    Doty, Michael A.

    1997-01-01

    A system and method for simultaneously collecting serial number information reports from numerous colliding coded-radio-frequency identity tags. Each tag has a unique multi-digit serial number that is stored in non-volatile RAM. A reader transmits an ASCII coded "D" character on a carrier of about 900 MHz and a power illumination field having a frequency of about 1.6 Ghz. A one MHz tone is modulated on the 1.6 Ghz carrier as a timing clock for a microprocessor in each of the identity tags. Over a thousand such tags may be in the vicinity and each is powered-up and clocked by the 1.6 Ghz power illumination field. Each identity tag looks for the "D" interrogator modulated on the 900 MHz carrier, and each uses a digit of its serial number to time a response. Clear responses received by the reader are repeated for verification. If no verification or a wrong number is received by any identity tag, it uses a second digital together with the first to time out a more extended period for response. Ultimately, the entire serial number will be used in the worst case collision environments; and since the serial numbers are defined as being unique, the final possibility will be successful because a clear time-slot channel will be available.

  15. System and method for simultaneously collecting serial number information from numerous identity tags

    DOEpatents

    Doty, M.A.

    1997-01-07

    A system and method are disclosed for simultaneously collecting serial number information reports from numerous colliding coded-radio-frequency identity tags. Each tag has a unique multi-digit serial number that is stored in non-volatile RAM. A reader transmits an ASCII coded ``D`` character on a carrier of about 900 MHz and a power illumination field having a frequency of about 1.6 Ghz. A one MHz tone is modulated on the 1.6 Ghz carrier as a timing clock for a microprocessor in each of the identity tags. Over a thousand such tags may be in the vicinity and each is powered-up and clocked by the 1.6 Ghz power illumination field. Each identity tag looks for the ``D`` interrogator modulated on the 900 MHz carrier, and each uses a digit of its serial number to time a response. Clear responses received by the reader are repeated for verification. If no verification or a wrong number is received by any identity tag, it uses a second digital together with the first to time out a more extended period for response. Ultimately, the entire serial number will be used in the worst case collision environments; and since the serial numbers are defined as being unique, the final possibility will be successful because a clear time-slot channel will be available. 5 figs.

  16. 76 FR 73604 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-29

    ... Defense. Deletion: K890.12 Identity Management (IDM) (March 18, 2010, 75 FR 13090). Reason: Due to policy... (SAAM) project (formerly known as Identity Management). [FR Doc. 2011-30698 Filed 11-28-11; 8:45 am... Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd floor, Suite 02G09, Alexandria...

  17. 5 CFR 736.103 - Protecting the identity of a source.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 2 2012-01-01 2012-01-01 false Protecting the identity of a source. 736.103 Section 736.103 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PERSONNEL INVESTIGATIONS Scope § 736.103 Protecting the identity of a source. When a...

  18. 5 CFR 736.103 - Protecting the identity of a source.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Protecting the identity of a source. 736.103 Section 736.103 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PERSONNEL INVESTIGATIONS Scope § 736.103 Protecting the identity of a source. When a...

  19. 5 CFR 736.103 - Protecting the identity of a source.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 2 2011-01-01 2011-01-01 false Protecting the identity of a source. 736.103 Section 736.103 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PERSONNEL INVESTIGATIONS Scope § 736.103 Protecting the identity of a source. When a...

  20. 5 CFR 736.103 - Protecting the identity of a source.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Protecting the identity of a source. 736.103 Section 736.103 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PERSONNEL INVESTIGATIONS Scope § 736.103 Protecting the identity of a source. When a...

  1. 5 CFR 736.103 - Protecting the identity of a source.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Protecting the identity of a source. 736.103 Section 736.103 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PERSONNEL INVESTIGATIONS Scope § 736.103 Protecting the identity of a source. When a...

  2. Fibonacci Identities, Matrices, and Graphs

    ERIC Educational Resources Information Center

    Huang, Danrun

    2005-01-01

    General strategies used to help discover, prove, and generalize identities for Fibonacci numbers are described along with some properties about the determinants of square matrices. A matrix proof for identity (2) that has received immense attention from many branches of mathematics, like linear algebra, dynamical systems, graph theory and others…

  3. [Identity and dissociation in cyberspace. A case of dissociative identity disorder associated with internet role playing].

    PubMed

    Te Wildt, B T; Kowalewski, E; Meibeyer, F; Huber, T

    2006-01-01

    By mediating dissociative experiences, the Internet can challenge the boundaries of people's sense of identity. To illustrate this hypothesis, a case of dissociative identity disorder (DID) is presented. A young unemployed woman created and frequently played several characters in an online game. For more than 2 years she spent up to 12 h a day in the Internet, assuming various personalities, which in return intruded upon her neglected real life. During the course of an inpatient psychotherapeutic treatment, the clinical diagnosis of DID was confirmed by psychometric testing. After 12 weeks of psychotherapy, the patient had managed to identify her fragmented identities as character traits and integrated them into her core personality. She rearranged her real everyday life, found a new job, and reduced her online activities. Even though the patient's psychopathology stems from a disposition in terms of a personality disorder with histrionic and narcissistic features, excessive internet role play obviously functioned as a trigger to develop DIS. Conclusively, cyberspace's anonymous interactivity may offer the possibility to explore one's identity while also putting at risk its coherence.

  4. Reliability of a k—out—of—n : G System with Identical Repairable Elements

    NASA Astrophysics Data System (ADS)

    Sharifi, M.; Nia, A. Torabi; Shafie, P.; Norozi-Zare, F.; Sabet-Ghadam, A.

    2009-09-01

    k—out—of—n models, are one of the most useful models to calculate the reliability of complex systems like electrical and mechanical devices. In this paper, we consider a k—out—of—n : G system with identical elements. The failure rate of each element is constant. The elements are repairable and the repair rate of each element is constant. The system works when at least k elements work. The system of equations are established and sought for the parameters like MTTF in real time situation. It seems that this model can tackle more realistic situations.

  5. Reimagining the self at late-career transitions: how identity threat influences academic physicians' retirement considerations.

    PubMed

    Onyura, Betty; Bohnen, John; Wasylenki, Don; Jarvis, Anna; Giblon, Barney; Hyland, Robert; Silver, Ivan; Leslie, Karen

    2015-06-01

    There is scant empirical work exploring academic physicians' psychosocial adjustment during late-career transitions or on the factors that influence their retirement decisions. The authors examine these issues through the lens of sociopsychological identity theory, specifically examining how identity threat influences academic physicians' decisions about retirement. Participants were academic physicians at a Canadian medical school and were recruited via e-mail requests for clinical faculty interested in discussing late-career and retirement planning issues. Participants included 15 males and 6 females (N = 21; mean age = 63, standard deviation = 7.54), representing eight specialties (clinical and surgical). Data were collected in October and November 2012 via facilitated focus groups, which were digitally recorded, transcribed verbatim, and anonymized, then analyzed using thematic analysis. Four primary themes were identified: centrality of occupational identity, experiences of identity threat, experiences of aging in an indifferent system, and coping with late-career transitions. Identity threats were manifested in apprehensions about self-esteem after retirement, practice continuity, and clinical competence, as well as in a loss of meaning and belonging. These identity challenges influenced decisions on whether to retire. Organizational and system support was perceived as wanting. Coping strategies included reimagining and revaluing various aspects of the self through assimilating new activities and reprioritizing others. Identity-related struggles are a significant feature of academic physicians' considerations about late-career transitions. Understanding these challenges, their antecedents, and their consequences can prepare faculty, and their institutions, to better manage late-career transitions. Individual- and institution-level implications are discussed.

  6. Waste management system

    NASA Technical Reports Server (NTRS)

    Sauer, R. L.; Jorgensen, G. K.

    1975-01-01

    The function of the waste management system was to control the disposition of solid and liquid wastes and waste stowage gases. The waste management system consisting of a urine subsystem and a fecal subsystem is described in detail and its overall performance is evaluated. Recommendations for improvement are given.

  7. Juggling identities of rheumatoid arthritis, motherhood and paid work - a grounded theory study.

    PubMed

    Feddersen, Helle; Mechlenborg Kristiansen, Tine; Tanggaard Andersen, Pernille; Hørslev-Petersen, Kim; Primdahl, Jette

    2018-02-01

    To explore how women with rheumatoid arthritis manage their illness, motherhood, and work life. A constructivist, grounded theory approach based on individual interviews and participant observations with 20 women with rheumatoid arthritis who participated in work life and had children living at home or were pregnant. After initial and focused coding Goffman's concepts of social identity were applied. A core category: "Juggling meaningful identities" and three conceptual categories were developed: (1) Work life as the strongest identity marker; (2) Motherhood: a two-sided act; (3) Living with rheumatoid arthritis as an identity? Paid work, motherhood, and illness are linked to the women's social identities. The women construct and change their identities in interactions with children, partners, other parents, colleagues, and employers. The women attribute the highest priority to their professional identity, spending the majority of their time and energy in an effort to appear as "good stable workers". The disease is seen as a hindrance in this regard, and the illness identity is almost completely rejected. In motherhood, the women prioritize close interaction with their children, and deprioritize external activities. Extended outbreaks of the disease and issues regarding the children force the women to deprioritize working life. Implications for rehabilitation Juggling meaningful identities of rheumatoid arthritis, motherhood, and paid work challenge women in managing their everyday lives. Therefore, rehabilitation professionals should support individuals to develop new strategies to manage the challenges they experience regarding juggling motherhood and work ability. Work is a dominant identity marker for women with rheumatoid arthritis therefore, rehabilitation professionals have an important role to play in investigating possible ways for the individual to maintain employment or return to work. Living with rheumatoid arthritis and being a paid worker challenge

  8. Identical synchronization of chaotic secure communication systems with channel induced coherence resonance

    NASA Astrophysics Data System (ADS)

    Sepantaie, Marc M.; Namazi, Nader M.; Sepantaie, Amir M.

    2016-05-01

    This paper is devoted to addressing the synchronization, and detection of random binary data exposed to inherent channel variations existing in Free Space Optical (FSO) communication systems. This task is achieved by utilizing the identical synchronization methodology of Lorenz chaotic communication system, and its synergetic interaction in adversities imposed by the FSO channel. Moreover, the Lorenz system has been analyzed, and revealed to induce Stochastic Resonance (SR) once exposed to Additive White Gaussian Noise (AWGN). In particular, the resiliency of the Lorenz chaotic system, in light of channel adversities, has been attributed to the success of the proposed communication system. Furthermore, this paper advocates the use of Haar wavelet transform for enhanced detection capability of the proposed chaotic communication system, which utilizes Chaotic Parameter Modulation (CPM) technique for means of transmission.

  9. Quantum entanglement for systems of identical bosons: I. General features

    NASA Astrophysics Data System (ADS)

    Dalton, B. J.; Goold, J.; Garraway, B. M.; Reid, M. D.

    2017-02-01

    These two accompanying papers are concerned with two mode entanglement for systems of identical massive bosons and the relationship to spin squeezing and other quantum correlation effects. Entanglement is a key quantum feature of composite systems in which the probabilities for joint measurements on the composite sub-systems are no longer determined from measurement probabilities on the separate sub-systems. There are many aspects of entanglement that can be studied. This two-part review focuses on the meaning of entanglement, the quantum paradoxes associated with entangled states, and the important tests that allow an experimentalist to determine whether a quantum state—in particular, one for massive bosons is entangled. An overall outcome of the review is to distinguish criteria (and hence experiments) for entanglement that fully utilize the symmetrization principle and the super-selection rules that can be applied to bosonic massive particles. In the first paper (I), the background is given for the meaning of entanglement in the context of systems of identical particles. For such systems, the requirement is that the relevant quantum density operators must satisfy the symmetrization principle and that global and local super-selection rules prohibit states in which there are coherences between differing particle numbers. The justification for these requirements is fully discussed. In the second quantization approach that is used, both the system and the sub-systems are modes (or sets of modes) rather than particles, particles being associated with different occupancies of the modes. The definition of entangled states is based on first defining the non-entangled states—after specifying which modes constitute the sub-systems. This work mainly focuses on the two mode entanglement for massive bosons, but is put in the context of tests of local hidden variable theories, where one may not be able to make the above restrictions. The review provides the detailed

  10. 21 CFR 21.44 - Verification of identity.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Verification of identity. 21.44 Section 21.44 Food... Verification of identity. (a) An individual seeking access to records in a Privacy Act Record System may be... identity. The identification required shall be suitable considering the nature of the records sought. No...

  11. 21 CFR 21.44 - Verification of identity.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 1 2013-04-01 2013-04-01 false Verification of identity. 21.44 Section 21.44 Food... Verification of identity. (a) An individual seeking access to records in a Privacy Act Record System may be... identity. The identification required shall be suitable considering the nature of the records sought. No...

  12. 21 CFR 21.44 - Verification of identity.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 1 2014-04-01 2014-04-01 false Verification of identity. 21.44 Section 21.44 Food... Verification of identity. (a) An individual seeking access to records in a Privacy Act Record System may be... identity. The identification required shall be suitable considering the nature of the records sought. No...

  13. 21 CFR 21.44 - Verification of identity.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 1 2012-04-01 2012-04-01 false Verification of identity. 21.44 Section 21.44 Food... Verification of identity. (a) An individual seeking access to records in a Privacy Act Record System may be... identity. The identification required shall be suitable considering the nature of the records sought. No...

  14. Managing Conflict in Temporary Management Systems

    ERIC Educational Resources Information Center

    Wilemon, David L.

    1973-01-01

    As organizational tasks have grown more complex, several innovative temporary management systems such as matrix management have been developed. The Apollo space program has been an important contribution to the development of matrix management techniques. Discusses the role of conflict within the matrix, its determinants, and the process of…

  15. Management Information Systems Research.

    DTIC Science & Technology

    Research on management information systems is illusive in many respects. Part of the basic research problem in MIS stems from the absence of standard...decision making. But the transition from these results to the realization of ’satisfactory’ management information systems remains difficult indeed. The...paper discusses several aspects of research on management information systems and reviews a selection of efforts that appear significant for future progress. (Author)

  16. [Normal pressure hydrocephalus: prognostic value of height in patients treated with an identical shunt system].

    PubMed

    Aguas, Jesús; Rodrigo, Victor; Estupiñan, Francisco; Nogues, Pere; Villalba, Gloria; Villagrasa, Javier; Caral, Luis

    2013-01-01

    Normal pressure hydrocephalus (NPH) is a clinical entity frequently managed by means of a cerebrospinal fluid shunt. Hydrodynamic hypotheses consider hydrostatic pressure (as well as height) a very important variable for shunt system function. However, we did not find empirical studies supporting the influence of height on clinical response in the literature. Our objective was to study the prognostic value of height, as a variable related to hydrostatic pressure, when an identical shunt system is used. A prospective series of 61 idiopathic NPH cases was analyzed. All cases were shunted by means of a ventricle-peritoneal system with a 100mmH2O opening pressure valve. Anthropometric, clinical, radiological and pressure variables were registered, as well as delay for treatment, improvement and complications. 78.7% of cases improved after shunting. This group of patients was significantly taller (P=.005) than the group without response (median value 165cm versus 152cm). There was also a significant correlation between height and ventricular size decrease after the shunt. In our series opening valve pressure was a constant (100mmHg) and we could consequently focus on the effect of hydrostatic pressure (height). Moreover, we found a positive predictive value for taller patients, probably because we had selected an opening pressure especially suitable for them. Current gravitational valve shunt systems also recommend considering patient height when customising the system. Our study empirically supports this idea. Copyright © 2012 Sociedad Española de Neurocirugía. Published by Elsevier España. All rights reserved.

  17. Integrated Approach to User Account Management

    NASA Technical Reports Server (NTRS)

    Kesselman, Glenn; Smith, William

    2007-01-01

    IT environments consist of both Windows and other platforms. Providing user account management for this model has become increasingly diffi cult. If Microsoft#s Active Directory could be enhanced to extend a W indows identity for authentication services for Unix, Linux, Java and Macintosh systems, then an integrated approach to user account manag ement could be realized.

  18. Strategic management of health care information systems: nurse managers' perceptions.

    PubMed

    Lammintakanen, Johanna; Kivinen, Tuula; Saranto, Kaija; Kinnunen, Juha

    2009-01-01

    The aim of this study is to describe nurse managers' perceptions of the strategic management of information systems in health care. Lack of strategic thinking is a typical feature in health care and this may also concern information systems. The data for this study was collected by eight focus group interviews including altogether 48 nurse managers from primary and specialised health care. Five main categories described the strategic management of information systems in health care; IT as an emphasis of strategy; lack of strategic management of information systems; the importance of management; problems in privacy protection; and costs of IT. Although IT was emphasised in the strategies of many health care organisations, a typical feature was a lack of strategic management of information systems. This was seen both as an underutilisation of IT opportunities in health care organisations and as increased workload from nurse managers' perspective. Furthermore, the nurse managers reported that implementation of IT strengthened their managerial roles but also required stronger management. In conclusion, strategic management of information systems needs to be strengthened in health care and nurse managers should be more involved in this process.

  19. Resource Management for Distributed Parallel Systems

    NASA Technical Reports Server (NTRS)

    Neuman, B. Clifford; Rao, Santosh

    1993-01-01

    Multiprocessor systems should exist in the the larger context of distributed systems, allowing multiprocessor resources to be shared by those that need them. Unfortunately, typical multiprocessor resource management techniques do not scale to large networks. The Prospero Resource Manager (PRM) is a scalable resource allocation system that supports the allocation of processing resources in large networks and multiprocessor systems. To manage resources in such distributed parallel systems, PRM employs three types of managers: system managers, job managers, and node managers. There exist multiple independent instances of each type of manager, reducing bottlenecks. The complexity of each manager is further reduced because each is designed to utilize information at an appropriate level of abstraction.

  20. Independent bases on the spatial wavefunction of four-identical-particle systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Xiao, Shuyuan; Deng, Zhixuan; Chen, Hong

    2013-12-15

    We construct the independent bases on the spatial wavefunction of four-identical-particle systems classified under the rotational group SO(3) and the permutation group S{sub 4} with the usage of transformation coefficients that relate wavefunctions described in one set of internal coordinates with those in another. The basis functions for N⩽ 2 are presented in the explicit expressions based on the harmonic oscillator model. Such independent bases are supposed to play a key role in the construction of the wavefunctions of the five-quark states and the variation calculation of four-body systems. Our prescription avoids the spurious states and can be programmed formore » arbitrary N.« less

  1. Universality of Schmidt decomposition and particle identity

    NASA Astrophysics Data System (ADS)

    Sciara, Stefania; Lo Franco, Rosario; Compagno, Giuseppe

    2017-03-01

    Schmidt decomposition is a widely employed tool of quantum theory which plays a key role for distinguishable particles in scenarios such as entanglement characterization, theory of measurement and state purification. Yet, its formulation for identical particles remains controversial, jeopardizing its application to analyze general many-body quantum systems. Here we prove, using a newly developed approach, a universal Schmidt decomposition which allows faithful quantification of the physical entanglement due to the identity of particles. We find that it is affected by single-particle measurement localization and state overlap. We study paradigmatic two-particle systems where identical qubits and qutrits are located in the same place or in separated places. For the case of two qutrits in the same place, we show that their entanglement behavior, whose physical interpretation is given, differs from that obtained before by different methods. Our results are generalizable to multiparticle systems and open the way for further developments in quantum information processing exploiting particle identity as a resource.

  2. Universality of Schmidt decomposition and particle identity

    PubMed Central

    Sciara, Stefania; Lo Franco, Rosario; Compagno, Giuseppe

    2017-01-01

    Schmidt decomposition is a widely employed tool of quantum theory which plays a key role for distinguishable particles in scenarios such as entanglement characterization, theory of measurement and state purification. Yet, its formulation for identical particles remains controversial, jeopardizing its application to analyze general many-body quantum systems. Here we prove, using a newly developed approach, a universal Schmidt decomposition which allows faithful quantification of the physical entanglement due to the identity of particles. We find that it is affected by single-particle measurement localization and state overlap. We study paradigmatic two-particle systems where identical qubits and qutrits are located in the same place or in separated places. For the case of two qutrits in the same place, we show that their entanglement behavior, whose physical interpretation is given, differs from that obtained before by different methods. Our results are generalizable to multiparticle systems and open the way for further developments in quantum information processing exploiting particle identity as a resource. PMID:28333163

  3. Universality of Schmidt decomposition and particle identity.

    PubMed

    Sciara, Stefania; Lo Franco, Rosario; Compagno, Giuseppe

    2017-03-23

    Schmidt decomposition is a widely employed tool of quantum theory which plays a key role for distinguishable particles in scenarios such as entanglement characterization, theory of measurement and state purification. Yet, its formulation for identical particles remains controversial, jeopardizing its application to analyze general many-body quantum systems. Here we prove, using a newly developed approach, a universal Schmidt decomposition which allows faithful quantification of the physical entanglement due to the identity of particles. We find that it is affected by single-particle measurement localization and state overlap. We study paradigmatic two-particle systems where identical qubits and qutrits are located in the same place or in separated places. For the case of two qutrits in the same place, we show that their entanglement behavior, whose physical interpretation is given, differs from that obtained before by different methods. Our results are generalizable to multiparticle systems and open the way for further developments in quantum information processing exploiting particle identity as a resource.

  4. Medical-Information-Management System

    NASA Technical Reports Server (NTRS)

    Alterescu, Sidney; Friedman, Carl A.; Frankowski, James W.

    1989-01-01

    Medical Information Management System (MIMS) computer program interactive, general-purpose software system for storage and retrieval of information. Offers immediate assistance where manipulation of large data bases required. User quickly and efficiently extracts, displays, and analyzes data. Used in management of medical data and handling all aspects of data related to care of patients. Other applications include management of data on occupational safety in public and private sectors, handling judicial information, systemizing purchasing and procurement systems, and analyses of cost structures of organizations. Written in Microsoft FORTRAN 77.

  5. Nursing professional identity: an infant or one with Alzheimer.

    PubMed

    Yazdannik, Ahmadreza; Yekta, Zohreh Parsa; Soltani, Aliasghar

    2012-02-01

    Each group or profession has its own discourse. Discourses create identity, support institutions and reproduce power relationships. Professional identity of Iranian nurses, which has recently had the opportunity to represent itself in social arena, needs investigation. This study aimed to make internal aspect of this identity clear. This study was conducted by discourse analysis, using data of 23 semi-structured individual interviews and 4 focus group interviews with nurses and senior nursing students of Tehran and Isfahan University of Medical Sciences, Iran, to evaluate their professional identity. In professional self-concept, elements like spirituality value and low financial benefits were identified as well as conflicting features of holiness and humility, identity emerging, identity escape, low professional self-confidence and justice seeking, lost professional authority and pride. Nursing professional identity has been formed based on cultural social structure, values and beliefs governing health system. This is a spectrum of a growing and emerging identity to a developed but forgotten identity. Although nursing discourse is subordinate in health system discourse, signs of moving toward professional maturity have emerged.

  6. Database Management System

    NASA Technical Reports Server (NTRS)

    1990-01-01

    In 1981 Wayne Erickson founded Microrim, Inc, a company originally focused on marketing a microcomputer version of RIM (Relational Information Manager). Dennis Comfort joined the firm and is now vice president, development. The team developed an advanced spinoff from the NASA system they had originally created, a microcomputer database management system known as R:BASE 4000. Microrim added many enhancements and developed a series of R:BASE products for various environments. R:BASE is now the second largest selling line of microcomputer database management software in the world.

  7. Illness Identity in Adults with a Chronic Illness.

    PubMed

    Oris, Leen; Luyckx, Koen; Rassart, Jessica; Goubert, Liesbet; Goossens, Eva; Apers, Silke; Arat, Seher; Vandenberghe, Joris; Westhovens, René; Moons, Philip

    2018-02-21

    The present study examines the concept of illness identity, the degree to which a chronic illness is integrated into one's identity, in adults with a chronic illness by validating a new self-report questionnaire, the Illness Identity Questionnaire (IIQ). Self-report questionnaires on illness identity, psychological, and physical functioning were assessed in two samples: adults with congenital heart disease (22-78 year old; n = 276) and with multisystem connective tissue disorders (systemic lupus erythematosus or systemic sclerosis; 17-81 year old; n = 241). The IIQ could differentiate four illness identity states (i.e., engulfment, rejection, acceptance, and enrichment) in both samples, based on exploratory and confirmatory factor analysis. All four subscales proved to be reliable. Rejection and engulfment were related to maladaptive psychological and physical functioning, whereas acceptance and enrichment were related to adaptive psychological and physical functioning. The present findings underscore the importance of the concept of illness identity. The IIQ, a self-report questionnaire, is introduced to measure four different illness identity states in adults with a chronic illness.

  8. Constructing nurses' professional identity through social identity theory.

    PubMed

    Willetts, Georgina; Clarke, David

    2014-04-01

    The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.

  9. Current management of gender identity disorder in childhood and adolescence: guidelines, barriers and areas of controversy.

    PubMed

    Shumer, Daniel E; Spack, Norman P

    2013-02-01

    The approach to gender identity disorder (GID) in childhood and adolescence has been rapidly evolving and is in a state of flux. In an effort to form management recommendations on the basis of the available literature, The Endocrine Society published clinical practice guidelines in 2009. The guidelines recommend against sex role change in prepubertal children, but they recommend the use of gonadotropin-releasing hormone (GnRH) agonists to suppress puberty in adolescence, and the use of cross-sex hormones starting around age 16 for eligible patients. In actual practice, the approach to GID is quite variable due to continued lack of consensus and specific barriers to treatment that are unique to GID. Recent literature has focused on the mental health approach to prepubertal children with GID and short-term outcomes using pubertal suppression and cross-sex steroids in adolescents with GID. This review will describe the literature published since the release of The Endocrine Society guidelines regarding the management of GID in both children and adolescents.

  10. Implementation of an RBF neural network on embedded systems: real-time face tracking and identity verification.

    PubMed

    Yang, Fan; Paindavoine, M

    2003-01-01

    This paper describes a real time vision system that allows us to localize faces in video sequences and verify their identity. These processes are image processing techniques based on the radial basis function (RBF) neural network approach. The robustness of this system has been evaluated quantitatively on eight video sequences. We have adapted our model for an application of face recognition using the Olivetti Research Laboratory (ORL), Cambridge, UK, database so as to compare the performance against other systems. We also describe three hardware implementations of our model on embedded systems based on the field programmable gate array (FPGA), zero instruction set computer (ZISC) chips, and digital signal processor (DSP) TMS320C62, respectively. We analyze the algorithm complexity and present results of hardware implementations in terms of the resources used and processing speed. The success rates of face tracking and identity verification are 92% (FPGA), 85% (ZISC), and 98.2% (DSP), respectively. For the three embedded systems, the processing speeds for images size of 288 /spl times/ 352 are 14 images/s, 25 images/s, and 4.8 images/s, respectively.

  11. Materials management information systems.

    PubMed

    1996-01-01

    The hospital materials management function--ensuring that goods and services get from a source to an end user--encompasses many areas of the hospital and can significantly affect hospital costs. Performing this function in a manner that will keep costs down and ensure adequate cash flow requires effective management of a large amount of information from a variety of sources. To effectively coordinate such information, most hospitals have implemented some form of materials management information system (MMIS). These systems can be used to automate or facilitate functions such as purchasing, accounting, inventory management, and patient supply charges. In this study, we evaluated seven MMISs from seven vendors, focusing on the functional capabilities of each system and the quality of the service and support provided by the vendor. This Evaluation is intended to (1) assist hospitals purchasing an MMIS by educating materials managers about the capabilities, benefits, and limitations of MMISs and (2) educate clinical engineers and information system managers about the scope of materials management within a healthcare facility. Because software products cannot be evaluated in the same manner as most devices typically included in Health Devices Evaluations, our standard Evaluation protocol was not applicable for this technology. Instead, we based our ratings on our observations (e.g., during site visits), interviews we conducted with current users of each system, and information provided by the vendor (e.g., in response to a request for information [RFI]). We divided the Evaluation into the following sections: Section 1. Responsibilities and Information Requirements of Materials Management: Provides an overview of typical materials management functions and describes the capabilities, benefits, and limitations of MMISs. Also includes the supplementary article, "Inventory Cost and Reimbursement Issues" and the glossary, "Materials Management Terminology." Section 2. The

  12. Resolving an identity crisis: Implicit drinking identity and implicit alcohol identity are related but not the same.

    PubMed

    Ramirez, Jason J; Olin, Cecilia C; Lindgren, Kristen P

    2017-09-01

    Two variations of the Implicit Association Test (IAT), the Drinking Identity IAT and the Alcohol Identity IAT, assess implicit associations held in memory between one's identity and alcohol-related constructs. Both have been shown to predict numerous drinking outcomes, but these IATs have never been directly compared to one another. The purpose of this study was to compare these IATs and evaluate their incremental predictive validity. US undergraduate students (N=64, 50% female, mean age=21.98years) completed the Drinking Identity IAT, the Alcohol Identity IAT, an explicit measure of drinking identity, as well as measures of typical alcohol consumption and hazardous drinking. When evaluated in separate regression models that controlled for explicit drinking identity, results indicated that the Drinking Identity IAT and the Alcohol Identity IAT were significant, positive predictors of typical alcohol consumption, and that the Drinking Identity IAT, but not the Alcohol Identity IAT, was a significant predictor of hazardous drinking. When evaluated in the same regression models, the Drinking Identity IAT, but not the Alcohol Identity IAT, was significantly associated with typical and hazardous drinking. These results suggest that the Drinking Identity IAT and Alcohol Identity IAT are related but not redundant. Moreover, given that the Drinking Identity IAT, but not the Alcohol Identity IAT, incrementally predicted variance in drinking outcomes, identification with drinking behavior and social groups, as opposed to identification with alcohol itself, may be an especially strong predictor of drinking outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. New nurse transition: success through aligning multiple identities.

    PubMed

    Leong, Yee Mun Jessica; Crossman, Joanna

    2015-01-01

    The purpose of this paper is to explore the perceptions of new nurses in Singapore of their experiences of role transition and to examine the implications for managers in terms of employee training, development and retention. This qualitative study was conducted using a constructivist grounded theory approach. In total 26 novice nurses and five preceptors (n=31) from five different hospitals participated in the study. Data were collected from semi-structured interviews and reflective journal entries and analysed using the constant comparative method. The findings revealed that novice nurses remained emotionally and physically challenged when experiencing role transition. Two major constructs appear to play an important part in the transition process; learning how to Fit in and aligning personal with professional and organisational identities. The findings highlight factors that facilitate or impede Fitting in and aligning these identities. Although the concept of Fitting in and its relation to the attrition of novice nurses has been explored in global studies, that relationship has not yet been theorised as the dynamic alignment of multiple identities. Also, whilst most research around Fitting in, identity and retention has been conducted in western countries, little is known about these issues and their interrelationship in the context of Singapore. The study should inform decision making by healthcare organisations, nurse managers and nursing training institutions with respect to improving the transition experience of novice nurses.

  14. [Womanhood today--identity experiences and identity crises].

    PubMed

    Kast, V

    1985-01-01

    Modern women's identity crises and the various possibilities of identification along the way towards a new identity can be seen as her attempts to develop out of the depressive situation that her once normal role identity had, to a large extent, placed her in. Under this aspect, even concepts of living that are seen by many to be problematic can be justified as leading along the way towards identity, which is so essential for human relationships and interpersonal empathy.

  15. On creating macroscopically identical granular systems with different numbers of particles

    NASA Astrophysics Data System (ADS)

    van der Meer, Devaraj; Rivas, Nicolas

    2015-11-01

    One of the fundamental differences between granular and molecular hydrodynamics is the enormous difference in the total number of constituents. The small number of particles implies that the role of fluctuations in granular dynamics is of paramount importance. To obtain more insight in these fluctuations, we investigate to what extent it is possible to create identical granular hydrodynamic states with different number of particles. A definition is given of macroscopically equivalent systems, and the dependency of the conservation equations on the particle size is studied. We show that, in certain cases, and by appropriately scaling the microscopic variables, we are able to compare systems with significantly different number of particles that present the same macroscopic phenomenology. We apply these scalings in simulations of a vertically vibrated system, namely the density inverted granular Leidenfrost state and its transition to a buoyancy-driven convective state.

  16. 14 CFR 1212.704 - System manager.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false System manager. 1212.704 Section 1212.704... Authority and Responsibilities § 1212.704 System manager. (a) Each system manager is responsible for the following with regard to the system of records over which the system manager has cognizance: (1) Overall...

  17. 14 CFR 1212.705 - System manager.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false System manager. 1212.705 Section 1212.705... Authority and Responsibilities § 1212.705 System manager. (a) Each system manager is responsible for the following with regard to the system of records over which the system manager has cognizance: (1) Overall...

  18. 14 CFR 1212.704 - System manager.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true System manager. 1212.704 Section 1212.704... Authority and Responsibilities § 1212.704 System manager. (a) Each system manager is responsible for the following with regard to the system of records over which the system manager has cognizance: (1) Overall...

  19. 14 CFR 1212.704 - System manager.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false System manager. 1212.704 Section 1212.704... Authority and Responsibilities § 1212.704 System manager. (a) Each system manager is responsible for the following with regard to the system of records over which the system manager has cognizance: (1) Overall...

  20. Exploring the link between environmental identity, behaviors and decision making

    NASA Astrophysics Data System (ADS)

    Freed, Allison

    This study was conducted with undergraduate students at a large university to investigate the association between environmental identity, pro-environmental behaviors and environmental decision-making. This study explored how environmental identity as defined by Clayton (2003) influenced the type of pro-environmental behaviors individuals choose to participate in. Environmental decision-making based on Kahneman's (2003, 2011) System 1 and System 2 framework was also assessed in association with environmental identity. A survey including the Environmental Identity Survey (Clayton, 2003), the Environmentally Responsible Behaviors Index (Smith-Sebasto & D'Acosta, 1995), and a Decision Making Questionnaire were administered. After administering the surveys, eight participants were chosen for a 60-minute interview. The quantitative results of the study showed there was a significant relationship between environmental identity and participating in environmental behaviors more often. There was also a significant relation between environmental identity and making the decision to recycle in a fast and automatic way. The interview results showed that participants with both a strong and a weak environmental identity recycled often and thought it was a fast decision. The results of this study show that certain components of environmental identity are important, but other factors like the physical environment and social norms influence the thinking that goes into recycling more than environmental identity alone. This study provides evidence of the importance of social norms and environmental structures in fostering pro-environmental behaviors and influencing the type of thinking that goes into making environmental decisions. Keywords: environmental identity, environmental behaviors, System 1, System 2, recycling.

  1. Development of Professional Identity in SMEs.

    ERIC Educational Resources Information Center

    Puurula, Arja; Lofstrom, Erika

    This paper describes a study of the development of professional identity among employees in small and medium sized enterprises (SMEs) participating in large-scale company-wide training programs. Managers and employees in 175 SMEs in Finland participated. These two research questions were posed: (1) are there differences in the perceptions of…

  2. Nursing professional identity: an infant or one with Alzheimer

    PubMed Central

    Yazdannik, Ahmadreza; Yekta, Zohreh Parsa; Soltani, Aliasghar

    2012-01-01

    Background: Each group or profession has its own discourse. Discourses create identity, support institutions and reproduce power relationships. Professional identity of Iranian nurses, which has recently had the opportunity to represent itself in social arena, needs investigation. This study aimed to make internal aspect of this identity clear. Materials and Methods: This study was conducted by discourse analysis, using data of 23 semi-structured individual interviews and 4 focus group interviews with nurses and senior nursing students of Tehran and Isfahan University of Medical Sciences, Iran, to evaluate their professional identity. Findings: In professional self-concept, elements like spirituality value and low financial benefits were identified as well as conflicting features of holiness and humility, identity emerging, identity escape, low professional self-confidence and justice seeking, lost professional authority and pride. Conclusions: Nursing professional identity has been formed based on cultural social structure, values and beliefs governing health system. This is a spectrum of a growing and emerging identity to a developed but forgotten identity. Although nursing discourse is subordinate in health system discourse, signs of moving toward professional maturity have emerged. PMID:23833602

  3. New Century, New Identities: Building on a Typology of Nonheterosexual College Men

    ERIC Educational Resources Information Center

    Dilley, Patrick

    2010-01-01

    Drawing on recent ethnographic studies of nonheterosexual youth, nonheterosexual identity development, and online collegiate identity management, this article outlines an extension of prior typological work concerning nonheterosexual male college students proposed by the author. Two new types ("Twitter Twinks" and "Lads Without Labels") are…

  4. Fault management for data systems

    NASA Technical Reports Server (NTRS)

    Boyd, Mark A.; Iverson, David L.; Patterson-Hine, F. Ann

    1993-01-01

    Issues related to automating the process of fault management (fault diagnosis and response) for data management systems are considered. Substantial benefits are to be gained by successful automation of this process, particularly for large, complex systems. The use of graph-based models to develop a computer assisted fault management system is advocated. The general problem is described and the motivation behind choosing graph-based models over other approaches for developing fault diagnosis computer programs is outlined. Some existing work in the area of graph-based fault diagnosis is reviewed, and a new fault management method which was developed from existing methods is offered. Our method is applied to an automatic telescope system intended as a prototype for future lunar telescope programs. Finally, an application of our method to general data management systems is described.

  5. Preferred Names, Preferred Pronouns, and Gender Identity in the Electronic Medical Record and Laboratory Information System: Is Pathology Ready?

    PubMed

    Imborek, Katherine L; Nisly, Nicole L; Hesseltine, Michael J; Grienke, Jana; Zikmund, Todd A; Dreyer, Nicholas R; Blau, John L; Hightower, Maia; Humble, Robert M; Krasowski, Matthew D

    2017-01-01

    Electronic medical records (EMRs) and laboratory information systems (LISs) commonly utilize patient identifiers such as legal name, sex, medical record number, and date of birth. There have been recommendations from some EMR working groups (e.g., the World Professional Association for Transgender Health) to include preferred name, pronoun preference, assigned sex at birth, and gender identity in the EMR. These practices are currently uncommon in the United States. There has been little published on the potential impact of these changes on pathology and LISs. We review the available literature and guidelines on the use of preferred name and gender identity on pathology, including data on changes in laboratory testing following gender transition treatments. We also describe pathology and clinical laboratory challenges in the implementation of preferred name at our institution. Preferred name, pronoun preference, and gender identity have the most immediate impact on the areas of pathology with direct patient contact such as phlebotomy and transfusion medicine, both in terms of interaction with patients and policies for patient identification. Gender identity affects the regulation and policies within transfusion medicine including blood donor risk assessment and eligibility. There are limited studies on the impact of gender transition treatments on laboratory tests, but multiple studies have demonstrated complex changes in chemistry and hematology tests. A broader challenge is that, even as EMRs add functionality, pathology computer systems (e.g., LIS, middleware, reference laboratory, and outreach interfaces) may not have functionality to store or display preferred name and gender identity. Implementation of preferred name, pronoun preference, and gender identity presents multiple challenges and opportunities for pathology.

  6. ENVIRONMENTAL SYSTEMS MANAGEMENT AND SUSTAINABLE SYSTEMS THEORY

    EPA Science Inventory

    Environmental Systems Management is the management of environmental problems at the systems level fully accounting for the multi-dimensional nature of the environment. This includes socio-economic dimensions as well as the usual physical and life science aspects. This is importa...

  7. Workflow management systems in radiology

    NASA Astrophysics Data System (ADS)

    Wendler, Thomas; Meetz, Kirsten; Schmidt, Joachim

    1998-07-01

    In a situation of shrinking health care budgets, increasing cost pressure and growing demands to increase the efficiency and the quality of medical services, health care enterprises are forced to optimize or complete re-design their processes. Although information technology is agreed to potentially contribute to cost reduction and efficiency improvement, the real success factors are the re-definition and automation of processes: Business Process Re-engineering and Workflow Management. In this paper we discuss architectures for the use of workflow management systems in radiology. We propose to move forward from information systems in radiology (RIS, PACS) to Radiology Management Systems, in which workflow functionality (process definitions and process automation) is implemented through autonomous workflow management systems (WfMS). In a workflow oriented architecture, an autonomous workflow enactment service communicates with workflow client applications via standardized interfaces. In this paper, we discuss the need for and the benefits of such an approach. The separation of workflow management system and application systems is emphasized, and the consequences that arise for the architecture of workflow oriented information systems. This includes an appropriate workflow terminology, and the definition of standard interfaces for workflow aware application systems. Workflow studies in various institutions have shown that most of the processes in radiology are well structured and suited for a workflow management approach. Numerous commercially available Workflow Management Systems (WfMS) were investigated, and some of them, which are process- oriented and application independent, appear suitable for use in radiology.

  8. Lithium battery management system

    DOEpatents

    Dougherty, Thomas J [Waukesha, WI

    2012-05-08

    Provided is a system for managing a lithium battery system having a plurality of cells. The battery system comprises a variable-resistance element electrically connected to a cell and located proximate a portion of the cell; and a device for determining, utilizing the variable-resistance element, whether the temperature of the cell has exceeded a predetermined threshold. A method of managing the temperature of a lithium battery system is also included.

  9. Brief report: the Utrecht-Management of Identity Commitments Scale (U-MICS): gender and age measurement invariance and convergent validity of the Turkish version.

    PubMed

    Morsunbul, Umit; Crocetti, Elisabetta; Cok, Figen; Meeus, Wim

    2014-08-01

    The purpose of this study was to evaluate the factor structure and convergent validity of the Turkish version of the Utrecht-Management of Identity Commitments Scale (U-MICS). Participants were 1201 (59.6% females) youth aged between 12 and 24 years (M(age) = 17.53 years, SD(age) = 3.25). Results indicated that the three-factor model consisting of commitment, in-depth exploration, and reconsideration of commitment provided a very good fit to the data and applied equally well to boys and girls as well as to three age groups (early adolescents, middle adolescents, and emerging adults). Significant relations between identity processes and self-concept clarity, personality, internalizing and externalizing problem behaviors, and parental relationships supported convergent validity. Thus, the Turkish version of U-MICS is a reliable tool for assessing identity in Turkish-speaking respondents. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  10. Exercisers' identities and exercise dependence: the mediating effect of exercise commitment.

    PubMed

    Lu, Frank Jing-Horng; Hsu, Eva Ya-Wen; Wang, Junn-Ming; Huang, Mei-Yao; Chang, Jo-Ning; Wang, Chien-Hsin

    2012-10-01

    The purpose of this study was to examine the associations of exercise identity, exercise commitment, exercise dependence, and, particularly, the mediating effects of exercise commitment on the relationship between exercise identity and exercise dependence. 253 Taiwanese regular exercisers completed measures, including the Exercise Dependence Scale-Revised, the Exercise Identity Scale, the Exercise Commitment Scale, and the Godin Leisure Time Exercise Questionnaire. Results showed that exercise identity, exercise dependence, and two types of exercise commitment were moderately to highly correlated. Furthermore, structural equation modelling indicated that a "have to" commitment partially mediated the relationship between exercise identity and exercise dependence. Based on the mediating role of a "have to" commitment, the findings are particularly informative to exercise instructors and for exercise program managers.

  11. Enamel: Molecular identity of its transepithelial ion transport system.

    PubMed

    Lacruz, Rodrigo S

    2017-07-01

    Enamel is the most calcified tissue in vertebrates. It differs from bone in a number of characteristics including its origin from ectodermal epithelium, lack of remodeling capacity by the enamel forming cells, and absence of collagen. The enamel-forming cells known as ameloblasts, choreograph first the synthesis of a unique protein-rich matrix, followed by the mineralization of this matrix into a tissue that is ∼95% mineral. To do this, ameloblasts arrange the coordinated movement of ions across a cell barrier while removing matrix proteins and monitoring extracellular pH using a variety of buffering systems to enable the growth of carbonated apatite crystals. Although our knowledge of these processes and the molecular identity of the proteins involved in transepithelial ion transport has increased in the last decade, it remains limited compared to other cells. Here we present an overview of the evolution and development of enamel, its differences with bone, and describe the ion transport systems associated with ameloblasts. Copyright © 2017 The Author. Published by Elsevier Ltd.. All rights reserved.

  12. 48 CFR 552.204-9 - Personal Identity Verification requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Personal Identity....204-9 Personal Identity Verification requirements. As prescribed in 504.1303, insert the following clause: Personal Identity Verification Requirements (OCT 2012) (a) The contractor shall comply with GSA...

  13. 48 CFR 552.204-9 - Personal Identity Verification requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Personal Identity....204-9 Personal Identity Verification requirements. As prescribed in 504.1303, insert the following clause: Personal Identity Verification Requirements (OCT 2012) (a) The contractor shall comply with GSA...

  14. 48 CFR 552.204-9 - Personal Identity Verification requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Personal Identity....204-9 Personal Identity Verification requirements. As prescribed in 504.1303, insert the following clause: Personal Identity Verification Requirements (OCT 2012) (a) The contractor shall comply with GSA...

  15. Archival Information Management System.

    DTIC Science & Technology

    1995-02-01

    management system named Archival Information Management System (AIMS), designed to meet the audit trail requirement for studies completed under the...are to be archived to the extent that future reproducibility and interrogation of results will exist. This report presents a prototype information

  16. Distinguishing Identical Particles and the Correct Counting of States

    ERIC Educational Resources Information Center

    de la Torre, A. C.; Martin, H. O.

    2009-01-01

    It is shown that quantum systems of identical particles can be treated as different when they are in well-differentiated states. This simplifying assumption allows for the consideration of quantum systems isolated from the rest of the universe and justifies many intuitive statements about identical systems. However, it is shown that this…

  17. Purge water management system

    DOEpatents

    Cardoso-Neto, J.E.; Williams, D.W.

    1995-01-01

    A purge water management system is described for effectively eliminating the production of purge water when obtaining a groundwater sample from a monitoring well. In its preferred embodiment, the purge water management system comprises an expandable container, a transportation system, and a return system. The purge water management system is connected to a wellhead sampling configuration, typically permanently installed at the well site. A pump, positioned with the monitoring well, pumps groundwater through the transportation system into the expandable container, which expands in direct proportion with volume of groundwater introduced, usually three or four well volumes, yet prevents the groundwater from coming into contact with the oxygen in the air. After this quantity of groundwater has been removed from the well, a sample is taken from a sampling port, after which the groundwater in the expandable container can be returned to the monitoring well through the return system. The purge water management system prevents the purge water from coming in contact with the outside environment, especially oxygen, which might cause the constituents of the groundwater to oxidize. Therefore, by introducing the purge water back into the monitoring well, the necessity of dealing with the purge water as a hazardous waste under the Resource Conservation and Recovery Act is eliminated.

  18. Purge water management system

    DOEpatents

    Cardoso-Neto, Joao E.; Williams, Daniel W.

    1996-01-01

    A purge water management system for effectively eliminating the production of purge water when obtaining a groundwater sample from a monitoring well. In its preferred embodiment, the purge water management system comprises an expandable container, a transportation system, and a return system. The purge water management system is connected to a wellhead sampling configuration, typically permanently installed at the well site. A pump, positioned with the monitoring well, pumps groundwater through the transportation system into the expandable container, which expands in direct proportion with volume of groundwater introduced, usually three or four well volumes, yet prevents the groundwater from coming into contact with the oxygen in the air. After this quantity of groundwater has been removed from the well, a sample is taken from a sampling port, after which the groundwater in the expandable container can be returned to the monitoring well through the return system. The purge water management system prevents the purge water from coming in contact with the outside environment, especially oxygen, which might cause the constituents of the groundwater to oxidize. Therefore, by introducing the purge water back into the monitoring well, the necessity of dealing with the purge water as a hazardous waste under the Resource Conservation and Recovery Act is eliminated.

  19. Gender identity disorder and its medico-legal considerations.

    PubMed

    Sharma, B R

    2007-01-01

    The general belief among behavioural scientists and physicians is that gender identity disorder or transsexualism is an identifiable and incapacitating disease which can be diagnosed and successfully treated by reassignment surgery in carefully selected patients. Although many advances have been made in the reassignment surgery techniques, phalloplasty still remains a major challenge; to date, no ideal technique has been developed. The new gender created by the reassignment surgery has, in turn, led to many legal complications for post-operative transsexuals because, in many developed and the developing countries, transsexuals are not given a legal identity, thereby adding to their agonies and miseries. This article examines the historical perspective, genesis and management of gender identity disorder, or transsexualism, and draws attention to the medico-legal considerations.

  20. MAINTENANCE MANAGEMENT ACCOUNTING SYSTEM OF WASTE WATER DISPOSAL SYSTEMS

    NASA Astrophysics Data System (ADS)

    Hori, Michihiro; Tsuruta, Takashi; Kaito, Kiyoyuki; Kobayashi, Kiyoshi

    Sewage works facilities consist of various assets groups. And there are many kinds of financial resources. In order to optimize the maintenance plan, and to secure the stability and sustainability of sewage works management, it is necessary to carry out financial simulation based on the life-cycle cost analysis. Furthermore, it is important to develop management accounting system that is interlinked with the financial accounting system, because many sewage administration bodies have their financial accounting systems as public enterprises. In this paper, a management accounting system, which is designed to provide basic information for asset management of sewage works facilities, is presented. Also the applicability of the management accounting system presented in this paper is examined through financial simulations.

  1. Transformation of Professional Identity in an Experienced Primary School Principal: A New Zealand Case Study

    ERIC Educational Resources Information Center

    Robertson, Sylvia

    2017-01-01

    School principals have unique identities that influence capacity to manage change. This New Zealand study explores professional identity in educational leadership and addresses a lesser researched area of identity transformation in longer-serving principals. Principals were asked how they perceived themselves as changing or changed as they led…

  2. Hospital information management system: an evolutionary knowledge management perspective.

    PubMed

    Wadhwa, S; Saxena, Avneet; Wadhwa, Bharat

    2007-01-01

    The evolving paradigm shift resulting from IT, social and technological changes has created a need for developing an innovative knowledge-based healthcare system, which can effectively meet global healthcare system demands and also cater to future trends. The Hospital Information Management System (HIMS) is developed with this sole aim in mind, which helps in processing and management of hospital information not only inside the boundary, but also beyond the hospital boundary, e.g., telemedicine or e-healthcare. The purpose of this paper is to present such kind of functional HIMS, which can efficiently satisfy the current and future system requirements by using Knowledge Management (KM) and data management systems. The HIMS is developed in a KM context, wherein users can share and use the knowledge more effectively. The proposed system is fully compatible with future technical, social, managerial and economical requirements.

  3. National and Gender Measurement Invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS): A 10-Nation Study With University Students.

    PubMed

    Crocetti, Elisabetta; Cieciuch, Jan; Gao, Cheng-Hai; Klimstra, Theo; Lin, Ching-Ling; Matos, Paula Mena; Morsünbül, Ümit; Negru, Oana; Sugimura, Kazumi; Zimmermann, Grégoire; Meeus, Wim

    2015-12-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in university students from a large array of cultural contexts, including 10 nations located in Europe (i.e., Italy, the Netherlands, Poland, Portugal, Romania, and Switzerland), Middle East (i.e., Turkey), and Asia (i.e., China, Japan, and Taiwan). Furthermore, we tested national and gender measurement invariance. Participants were 6,118 (63.2% females) university students aged from 18 to 25 years (Mage = 20.91 years). Results indicated that the three-factor structure of the U-MICS fitted well in the total sample, in each national group, and in gender groups. Furthermore, national and gender measurement invariance were established. Thus, the U-MICS can be fruitfully applied to study identity in university students from various Western and non-Western contexts. © The Author(s) 2015.

  4. Flexible data-management system

    NASA Technical Reports Server (NTRS)

    Pelouch, J. J., Jr.

    1977-01-01

    Combined ASRDI Data-Management and Analysis Technique (CADMAT) is system of computer programs and procedures that can be used to conduct data-management tasks. System was developed specifically for use by scientists and engineers who are confronted with management and analysis of large quantities of data organized into records of events and parametric fields. CADMAT is particularly useful when data are continually accumulated, such as when the need of retrieval and analysis is ongoing.

  5. Gender identity and the management of the transgender patient: a guide for non-specialists.

    PubMed

    Joseph, Albert; Cliffe, Charlotte; Hillyard, Miriam; Majeed, Azeem

    2017-04-01

    In this review, we introduce the topic of transgender medicine, aimed at the non-specialist clinician working in the UK. Appropriate terminology is provided alongside practical advice on how to appropriately care for transgender people. We offer a brief theoretical discussion on transgenderism and consider how it relates to broader understandings of both gender and disease. In respect to epidemiology, while it is difficult to assess the exact size of the transgender population in the UK, population surveys suggest a prevalence of between 0.2 and 0.6% in adults, with rates of referrals to gender identity clinics in the UK increasing yearly. We outline the legal framework that protects the rights of transgender people, showing that is not legal for physicians to deny transgender people access to services based on their personal beliefs. Being transgender is often, although not always, associated with gender dysphoria, a potentially disabling condition in which the discordance between a person's natal sex (that assigned to them at birth) and gender identity results in distress, with high associated rates of self-harm, suicidality and functional impairment. We show that gender reassignment can be a safe and effective treatment for gender dysphoria with counselling, exogenous hormones and surgery being the mainstay of treatment. The role of the general practitioner in the management of transgender patients is discussed and we consider whether hormone therapy should be initiated in primary care in the absence of specialist advice, as is suggested by recent General Medical Council guidance.

  6. "It Was Not Me That Was Sick, It Was the Building": Rhetorical Identity Management Strategies in the Context of Observed or Suspected Indoor Air Problems in Workplaces.

    PubMed

    Finell, Eerika; Seppälä, Tuija; Suoninen, Eero

    2018-07-01

    Suffering from a contested illness poses a serious threat to one's identity. We analyzed the rhetorical identity management strategies respondents used when depicting their health problems and lives in the context of observed or suspected indoor air (IA) problems in the workplace. The data consisted of essays collected by the Finnish Literature Society. We used discourse-oriented methods to interpret a variety of language uses in the construction of identity strategies. Six strategies were identified: respondents described themselves as normal and good citizens with strong characters, and as IA sufferers who received acknowledge from others, offered positive meanings to their in-group, and demanded recognition. These identity strategies located on two continua: (a) individual- and collective-level strategies and (b) dissolved and emphasized (sub)category boundaries. The practical conclusion is that professionals should be aware of these complex coping strategies when aiming to interact effectively with people suffering from contested illnesses.

  7. Medical Information Management System

    NASA Technical Reports Server (NTRS)

    Alterescu, S.; Hipkins, K. R.; Friedman, C. A.

    1979-01-01

    On-line interactive information processing system easily and rapidly handles all aspects of data management related to patient care. General purpose system is flexible enough to be applied to other data management situations found in areas such as occupational safety data, judicial information, or personnel records.

  8. Acquisition Management for System of Systems: Affordability through Effective Portfolio Management

    DTIC Science & Technology

    2013-04-01

    the management of strategic “ portfolios of systems” in military acquisitions; this includes application of Real Options (RO) theory and metrics such...Affordability Through Effective Portfolio Management Navindran Davendralingam and Daniel DeLaurentis Purdue University Published April 1, 2013...Systems: Affordability Through Effective Portfolio Management 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  9. E-dating, identity and HIV prevention: theorising sexualities, risk and network society.

    PubMed

    Davis, Mark; Hart, Graham; Bolding, Graham; Sherr, Lorraine; Elford, Jonathan

    2006-05-01

    This paper addresses how London gay men use the internet to meet sexual partners, or for e-dating. Based on qualitative interviews conducted face-to-face or via the internet, this research develops an account of how information technologies mediate the negotiation of identity and risk in connection with sexual practice. E-dating itself is a bricolage, or heterogeneous DIY practice of internet-based-communication (IBC). A central aspect of IBC is "filtering" in and out prospective e-dates based on the images and texts used to depict sexual identities. Interpretations and depictions of personal HIV risk management approaches in IBC are framed by the meanings of different identities, such as the stigma associated with being HIV positive. This paper argues for a sexualities perspective in a theory of network society. Further, HIV prevention in e-dating can potentially be addressed by considering the interplay of the HIV prevention imperatives associated with different HIV serostatus identities. There is a case for encouraging more explicit IBC about risk in e-dating and incorporating the expertise of e-daters in prevention activity. There is also a need to rethink traditional conceptions of risk management in HIV prevention to make space for the risk management bricolage of network society.

  10. Identity and stammering: negotiating hesitation, side-stepping repetition, and sometimes avoiding deviation.

    PubMed

    Butler, Clare

    2013-09-01

    Individuals who experience speech dysfluency are often stigmatised because their speech acts differ from the communicative norm. This article is located in and seeks to further the identity debates in exploring how individuals who are subject to the intermittent emergence of a stigmatised characteristic manage this randomised personal discrediting in their identity work. Through a series of focus groups and semi-structured interviews participants grudgingly report their management approaches which include concealing, drafting in unwitting others, role-playing and segregating self from their stammer. In describing how they manage their stammer they detail their use of the social space in a number of ways, including as a hiding place; a site for 'it' (the stammer); a gap in which to switch words; and a different area in which to perform. This study offers important insights, increasing our understanding of the often hidden negotiations of identity work and the sometime ingenious use of space in the management of a social stigma. © 2013 The Author. Sociology of Health & Illness © 2013 Foundation for the Sociology of Health & Illness/John Wiley © Sons Ltd. Published by John Wiley © Sons Ltd.

  11. Unlocking data: federated identity with LSDMA and dCache

    NASA Astrophysics Data System (ADS)

    Millar, AP; Behrmann, G.; Bernardt, C.; Fuhrmann, P.; Hardt, M.; Hayrapetyan, A.; Litvintsev, D.; Mkrtchyan, T.; Rossi, A.; Schwank, K.

    2015-12-01

    X.509, the dominant identity system from grid computing, has proved unpopular for many user communities. More popular alternatives generally assume the user is interacting via their web-browser. Such alternatives allow a user to authenticate with many services with the same credentials (user-name and password). They also allow users from different organisations form collaborations quickly and simply. Scientists generally require that their custom analysis software has direct access to the data. Such direct access is not currently supported by alternatives to X.509, as they require the use of a web-browser. Various approaches to solve this issue are being investigated as part of the Large Scale Data Management and Analysis (LSDMA) project, a German funded national R&D project. These involve dynamic credential translation (creating an X.509 credential) to allow backwards compatibility in addition to direct SAML- and OpenID Connect-based authentication. We present a summary of the current state of art and the current status of the federated identity work funded by the LSDMA project along with the future road map.

  12. Applying management information systems to staffing.

    PubMed

    Hanson, R L

    1982-10-01

    A management information system (MIS) is a tool for managing resources effectively. After reviewing some concepts and principles for effective data management, Hanson clearly applies the concepts to nurse staffing systems, which manage human resources. He defines a seven-step process for establishing an MIS, from defining the management objective to implementing the system. Pointing out that an MIS need not be computerized to be effective, Hanson presents a positive perspective and clarifies some often-misconceived notions about management information systems and the paper printouts they generate. In the next issue of JONA, a second article by Hanson will take a more detailed look at the variety, use, and usefulness of staffing statistics available from an MIS for staffing. These articles are based on material in a forthcoming book, Management Systems for Nursing Service Staffing, to be published by Aspen Systems Corporation, Rockville, Maryland.

  13. Preferred Names, Preferred Pronouns, and Gender Identity in the Electronic Medical Record and Laboratory Information System: Is Pathology Ready?

    PubMed Central

    Imborek, Katherine L.; Nisly, Nicole L.; Hesseltine, Michael J.; Grienke, Jana; Zikmund, Todd A.; Dreyer, Nicholas R.; Blau, John L.; Hightower, Maia; Humble, Robert M.; Krasowski, Matthew D.

    2017-01-01

    Background: Electronic medical records (EMRs) and laboratory information systems (LISs) commonly utilize patient identifiers such as legal name, sex, medical record number, and date of birth. There have been recommendations from some EMR working groups (e.g., the World Professional Association for Transgender Health) to include preferred name, pronoun preference, assigned sex at birth, and gender identity in the EMR. These practices are currently uncommon in the United States. There has been little published on the potential impact of these changes on pathology and LISs. Methods: We review the available literature and guidelines on the use of preferred name and gender identity on pathology, including data on changes in laboratory testing following gender transition treatments. We also describe pathology and clinical laboratory challenges in the implementation of preferred name at our institution. Results: Preferred name, pronoun preference, and gender identity have the most immediate impact on the areas of pathology with direct patient contact such as phlebotomy and transfusion medicine, both in terms of interaction with patients and policies for patient identification. Gender identity affects the regulation and policies within transfusion medicine including blood donor risk assessment and eligibility. There are limited studies on the impact of gender transition treatments on laboratory tests, but multiple studies have demonstrated complex changes in chemistry and hematology tests. A broader challenge is that, even as EMRs add functionality, pathology computer systems (e.g., LIS, middleware, reference laboratory, and outreach interfaces) may not have functionality to store or display preferred name and gender identity. Conclusions: Implementation of preferred name, pronoun preference, and gender identity presents multiple challenges and opportunities for pathology. PMID:29114436

  14. Oil field management system

    DOEpatents

    Fincke, James R.

    2003-09-23

    Oil field management systems and methods for managing operation of one or more wells producing a high void fraction multiphase flow. The system includes a differential pressure flow meter which samples pressure readings at various points of interest throughout the system and uses pressure differentials derived from the pressure readings to determine gas and liquid phase mass flow rates of the high void fraction multiphase flow. One or both of the gas and liquid phase mass flow rates are then compared with predetermined criteria. In the event such mass flow rates satisfy the predetermined criteria, a well control system implements a correlating adjustment action respecting the multiphase flow. In this way, various parameters regarding the high void fraction multiphase flow are used as control inputs to the well control system and thus facilitate management of well operations.

  15. Intelligent Integrated System Health Management

    NASA Technical Reports Server (NTRS)

    Figueroa, Fernando

    2012-01-01

    Intelligent Integrated System Health Management (ISHM) is the management of data, information, and knowledge (DIaK) with the purposeful objective of determining the health of a system (Management: storage, distribution, sharing, maintenance, processing, reasoning, and presentation). Presentation discusses: (1) ISHM Capability Development. (1a) ISHM Knowledge Model. (1b) Standards for ISHM Implementation. (1c) ISHM Domain Models (ISHM-DM's). (1d) Intelligent Sensors and Components. (2) ISHM in Systems Design, Engineering, and Integration. (3) Intelligent Control for ISHM-Enabled Systems

  16. Design of distributed systems of hydrolithosphere processes management. A synthesis of distributed management systems

    NASA Astrophysics Data System (ADS)

    Pershin, I. M.; Pervukhin, D. A.; Ilyushin, Y. V.; Afanaseva, O. V.

    2017-10-01

    The paper considers an important problem of designing distributed systems of hydrolithosphere processes management. The control actions on the hydrolithosphere processes under consideration are implemented by a set of extractive wells. The article shows the method of defining the approximation links for description of the dynamic characteristics of hydrolithosphere processes. The structure of distributed regulators, used in the management systems by the considered processes, is presented. The paper analyses the results of the synthesis of the distributed management system and the results of modelling the closed-loop control system by the parameters of the hydrolithosphere process.

  17. Job satisfaction and gender identity of women managers and non-managers.

    PubMed

    Lipińska-Grobelny, Agnieszka; Wasiak, Katarzyna

    2010-01-01

    This work investigates different cognitive aspects of job satisfaction (co-workers, supervisor, job content, working facilities, organization and management, opportunities for development, income), positive and negative affect at work and their relations to gender role orientation of women occupying managerial and non-managerial positions. The sample of 122 women (60 managers and 62 non-managers) completed a battery of instruments such as: the Bem Sex Role Inventory, the Job Description Inventory by Neuberger and Allerbeck and the Job Affect Scale by Brief et al. Most women managers represented androgynous and masculine types, while women non-managers belonged to androgynous and feminine types. Moreover, women with various degrees of sex-typing showed positive and negative affect at work. The most satisfied with income were masculine women managers, the least--feminine women non-managers. These results may be applied in designing of motivational instruments to enhance job effectiveness and to eliminate unproductive behaviours such as absenteeism, high staff turnover.

  18. Management advisory memorandum on National Airspace System infrastructure management system prototype, Federal Aviation Administration

    DOT National Transportation Integrated Search

    1997-03-01

    This is our Management Advisory Memorandum on the National Airspace : System (NAS) Infrastructure Management System (NIMS) prototype : project in the Federal Aviation Administration (FAA). Our review was : initiated in response to a hotline complaint...

  19. Mapping the identity of a viewed hand in the motor system: evidence from stimulus-response compatibility.

    PubMed

    Vainio, Lari; Mustonen, Terhi

    2011-02-01

    Brain-imaging research has shown that a viewed acting hand is mapped to the observer's hand representation that corresponds with the identity of the hand. In contrast, behavioral research has suggested that rather than representing a seen hand in relation to one's own manual system, it is represented in relation to the midline of an imaginary body. This view was drawn from the finding that indicated that the posture of the viewed hand determines how the hand facilitates responses. The present study explored how an identity of a viewed static hand facilitates responses by varying the onset time and the posture of the hand. The results were in line with the view that an observed hand can activate the observer's hand representation that corresponds with the identity of the hand. However, the posture of the hand did not influence these mapping processes. What mattered was the perspective (i.e., egocentric vs. allocentric) from which the hand was viewed. (c) 2010 APA, all rights reserved.

  20. Governance and Corporate Identity in Network Universities.

    ERIC Educational Resources Information Center

    Smith, Robert

    1992-01-01

    A discussion of university autonomy and institutional image is presented with reference to politics at the newly established University of New England (Australia). Elements of institutional image or identity are examined, including (1) symbolic issues such as logo and location of administration; (2) leadership and management structures; (3)…

  1. Integrated Systems Health Management for Intelligent Systems

    NASA Technical Reports Server (NTRS)

    Figueroa, Fernando; Melcher, Kevin

    2011-01-01

    The implementation of an integrated system health management (ISHM) capability is fundamentally linked to the management of data, information, and knowledge (DIaK) with the purposeful objective of determining the health of a system. Management implies storage, distribution, sharing, maintenance, processing, reasoning, and presentation. ISHM is akin to having a team of experts who are all individually and collectively observing and analyzing a complex system, and communicating effectively with each other in order to arrive at an accurate and reliable assessment of its health. In this chapter, concepts, procedures, and approaches are presented as a foundation for implementing an ISHM capability relevant to intelligent systems. The capability stresses integration of DIaK from all elements of a system, emphasizing an advance toward an on-board, autonomous capability. Both ground-based and on-board ISHM capabilities are addressed. The information presented is the result of many years of research, development, and maturation of technologies, and of prototype implementations in operational systems.

  2. Examining Game Design Features for Identity Exploration and Change

    ERIC Educational Resources Information Center

    Foster, Aroutis; Shah, Mamta

    2016-01-01

    This study used the Dynamic Systems Model of Role Identity (DSMRI) to examine the extent to which a game, Land Science, afforded identity change opportunities as exploration of science identities, science content knowledge, science confidence, action possibilities, and interest/valuing in an intentional manner. Analysis of the game and existing…

  3. Efficient Evaluation System for Learning Management Systems

    ERIC Educational Resources Information Center

    Cavus, Nadire

    2009-01-01

    A learning management system (LMS) provides the platform for web-based learning environment by enabling the management, delivery, tracking of learning, testing, communication, registration process and scheduling. There are many LMS systems on the market that can be obtained for free or through payment. It has now become an important task to choose…

  4. Knowledge-based systems for power management

    NASA Technical Reports Server (NTRS)

    Lollar, L. F.

    1992-01-01

    NASA-Marshall's Electrical Power Branch has undertaken the development of expert systems in support of further advancements in electrical power system automation. Attention is given to the features (1) of the Fault Recovery and Management Expert System, (2) a resource scheduler or Master of Automated Expert Scheduling Through Resource Orchestration, and (3) an adaptive load-priority manager, or Load Priority List Management System. The characteristics of an advisory battery manager for the Hubble Space Telescope, designated the 'nickel-hydrogen expert system', are also noted.

  5. Management Information System Project.

    ERIC Educational Resources Information Center

    Foley, Walter J.; Harr, Gordon G.

    The Management Information System (MIS) described in this report represents a plan to utilize modern management techniques to facilitate the goal of a learner-responsive school system. The MIS component is being developed to meet the need for the coordination of the resources of staff, facilities, and time with the long range planning and…

  6. A map of terminal regulators of neuronal identity in Caenorhabditis elegans

    PubMed Central

    2016-01-01

    Our present day understanding of nervous system development is an amalgam of insights gained from studying different aspects and stages of nervous system development in a variety of invertebrate and vertebrate model systems, with each model system making its own distinctive set of contributions. One aspect of nervous system development that has been among the most extensively studied in the nematode Caenorhabditis elegans is the nature of the gene regulatory programs that specify hardwired, terminal cellular identities. I first summarize a number of maps (anatomical, functional, and molecular) that describe the terminal identity of individual neurons in the C. elegans nervous system. I then provide a comprehensive summary of regulatory factors that specify terminal identities in the nervous system, synthesizing these past studies into a regulatory map of cellular identities in the C. elegans nervous system. This map shows that for three quarters of all neurons in the C. elegans nervous system, regulatory factors that control terminal identity features are known. In‐depth studies of specific neuron types have revealed that regulatory factors rarely act alone, but rather act cooperatively in neuron‐type specific combinations. In most cases examined so far, distinct, biochemically unlinked terminal identity features are coregulated via cooperatively acting transcription factors, termed terminal selectors, but there are also cases in which distinct identity features are controlled in a piecemeal fashion by independent regulatory inputs. The regulatory map also illustrates that identity‐defining transcription factors are reemployed in distinct combinations in different neuron types. However, the same transcription factor can drive terminal differentiation in neurons that are unrelated by lineage, unrelated by function, connectivity and neurotransmitter deployment. Lastly, the regulatory map illustrates the preponderance of homeodomain transcription factors in the

  7. THE HOW AND WHY OF THE MOVEMENT SYSTEM AS THE IDENTITY OF PHYSICAL THERAPY.

    PubMed

    Sahrmann, Shirley

    2017-11-01

    The Movement System was adopted as the identity of physical therapy as one of the 8 guiding principles accompanying the Vision Statement of 2013. At its inception physical therapy was considered more of a technical field rather than that of a professional field. Physicians were to diagnose the patient's problem and the therapist was to follow the prescription provided by the physician with the primary purpose being to relieve symptoms such as pain or muscle weakness. Even by the 1960's, the prescription became more of a referral and there was recognition that therapists were making decisions about the patient's treatment and discharge disposition. The role of the physical therapist in pathokinesiologic problems has been well accepted over the years but as insights are gained about the role of movement in musculoskeletal pain, the concept of kinesiopathologic problems is being defined. Whether the movement dysfunction is from a pathokinesiologic or a kinesiopathologic mechanisms, the underlying physiologic process is movement which is the composite action of the movement system. This article provides a brief discussion of the steps leading to promotion of the identity and the reasons that further defining and promoting the movement system as the body system for which physical therapists are responsible is necessary for the full recognition of the profession. As suggested by the kinesiopathologic concept of movement inducing pathology, physical therapists can address the cause of musculoskeletal problems and not just symptoms or consequences such as the pathoanatomic problem. 5.

  8. Bringing social identity to work: the influence of manifestation and suppression on perceived discrimination, job satisfaction, and turnover intentions.

    PubMed

    Madera, Juan M; King, Eden B; Hebl, Michelle R

    2012-04-01

    In the current article, we explored whether manifesting or suppressing an identity (race/ethnicity, gender, age, religion, sexual orientation, or disability) at work is related to perceived discrimination, job satisfaction, and turnover intentions. Participants included 211 working adults who completed an online survey. The results showed that efforts to suppress a group identity were positively (and behavioral manifestations of group identity negatively) related to perceived discrimination, which predicted job satisfaction and turnover intentions. These results suggest that diverse employees actively manage their nonwork identities while at work and that these identity management strategies have important consequences. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  9. Planning and Resource Management in an Intelligent Automated Power Management System

    NASA Technical Reports Server (NTRS)

    Morris, Robert A.

    1991-01-01

    Power system management is a process of guiding a power system towards the objective of continuous supply of electrical power to a set of loads. Spacecraft power system management requires planning and scheduling, since electrical power is a scarce resource in space. The automation of power system management for future spacecraft has been recognized as an important R&D goal. Several automation technologies have emerged including the use of expert systems for automating human problem solving capabilities such as rule based expert system for fault diagnosis and load scheduling. It is questionable whether current generation expert system technology is applicable for power system management in space. The objective of the ADEPTS (ADvanced Electrical Power management Techniques for Space systems) is to study new techniques for power management automation. These techniques involve integrating current expert system technology with that of parallel and distributed computing, as well as a distributed, object-oriented approach to software design. The focus of the current study is the integration of new procedures for automatically planning and scheduling loads with procedures for performing fault diagnosis and control. The objective is the concurrent execution of both sets of tasks on separate transputer processors, thus adding parallelism to the overall management process.

  10. Energy Management of Smart Distribution Systems

    NASA Astrophysics Data System (ADS)

    Ansari, Bananeh

    Electric power distribution systems interface the end-users of electricity with the power grid. Traditional distribution systems are operated in a centralized fashion with the distribution system owner or operator being the only decision maker. The management and control architecture of distribution systems needs to gradually transform to accommodate the emerging smart grid technologies, distributed energy resources, and active electricity end-users or prosumers. The content of this document concerns with developing multi-task multi-objective energy management schemes for: 1) commercial/large residential prosumers, and 2) distribution system operator of a smart distribution system. The first part of this document describes a method of distributed energy management of multiple commercial/ large residential prosumers. These prosumers not only consume electricity, but also generate electricity using their roof-top solar photovoltaics systems. When photovoltaics generation is larger than local consumption, excess electricity will be fed into the distribution system, creating a voltage rise along the feeder. Distribution system operator cannot tolerate a significant voltage rise. ES can help the prosumers manage their electricity exchanges with the distribution system such that minimal voltage fluctuation occurs. The proposed distributed energy management scheme sizes and schedules each prosumer's ES to reduce the electricity bill and mitigate voltage rise along the feeder. The second part of this document focuses on emergency energy management and resilience assessment of a distribution system. The developed emergency energy management system uses available resources and redundancy to restore the distribution system's functionality fully or partially. The success of the restoration maneuver depends on how resilient the distribution system is. Engineering resilience terminology is used to evaluate the resilience of distribution system. The proposed emergency energy

  11. Social identity change: shifts in social identity during adolescence.

    PubMed

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.

  12. Fingerprint Recognition with Identical Twin Fingerprints

    PubMed Central

    Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar. PMID:22558204

  13. Fingerprint recognition with identical twin fingerprints.

    PubMed

    Tao, Xunqiang; Chen, Xinjian; Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  14. Operational Management System for Regulated Water Systems

    NASA Astrophysics Data System (ADS)

    van Loenen, A.; van Dijk, M.; van Verseveld, W.; Berger, H.

    2012-04-01

    Most of the Dutch large rivers, canals and lakes are controlled by the Dutch water authorities. The main reasons concern safety, navigation and fresh water supply. Historically the separate water bodies have been controlled locally. For optimizating management of these water systems an integrated approach was required. Presented is a platform which integrates data from all control objects for monitoring and control purposes. The Operational Management System for Regulated Water Systems (IWP) is an implementation of Delft-FEWS which supports operational control of water systems and actively gives advice. One of the main characteristics of IWP is that is real-time collects, transforms and presents different types of data, which all add to the operational water management. Next to that, hydrodynamic models and intelligent decision support tools are added to support the water managers during their daily control activities. An important advantage of IWP is that it uses the Delft-FEWS framework, therefore processes like central data collection, transformations, data processing and presentation are simply configured. At all control locations the same information is readily available. The operational water management itself gains from this information, but it can also contribute to cost efficiency (no unnecessary pumping), better use of available storage and advise during (water polution) calamities.

  15. Comparative Associations Between Achieved Bicultural Identity, Achieved Ego Identity, and Achieved Religious Identity and Adaptation Among Australian Adolescent Muslims.

    PubMed

    Abu-Rayya, Hisham M; Abu-Rayya, Maram H; White, Fiona A; Walker, Richard

    2018-04-01

    This study examined the comparative roles of biculturalism, ego identity, and religious identity in the adaptation of Australian adolescent Muslims. A total of 504 high school Muslim students studying at high schools in metropolitan Sydney and Melbourne, Australia, took part in this study which required them to complete a self-report questionnaire. Analyses indicated that adolescent Muslims' achieved religious identity seems to play a more important role in shaping their psychological and socio-cultural adaptation compared to adolescents' achieved bicultural identity. Adolescents' achieved ego identity tended also to play a greater role in their psychological and socio-cultural adaptation than achieved bicultural identity. The relationships between the three identities and negative indicators of psychological adaptation were consistently indifferent. Based on these findings, we propose that the three identity-based forces-bicultural identity development, religious identity attainment, and ego identity formation-be amalgamated into one framework in order for researchers to more accurately examine the adaptation of Australian adolescent Muslims.

  16. Toward a general theory of conical intersections in systems of identical nuclei

    NASA Astrophysics Data System (ADS)

    Keating, Sean P.; Mead, C. Alden

    1987-02-01

    It has been shown previously that the Herzberg-Longuet-Higgins sign change produced in Born-Oppenheimer electronic wave functions when the nuclei traverse a closed path around a conical intersection has implications for the symmetry of wave functions under permutations of identical nuclei. For systems of three or four identical nuclei, there are special features present which have facilitated the detailed analysis. The present paper reports progress toward a general theory for systems of n nuclei. For n=3 or 4, the two key functions which locate conical intersections and define compensating phase factors can conveniently be defined so as to transform under permutations according to a two-dimensional irreducible representation of the permutation group. Since such representations do not exist for n>4, we have chosen to develop a formalism in terms of lab-fixed electronic basis functions, and we show how to define the two key functions in principle. The functions so defined both turn out to be totally symmetric under permutations. We show how they can be used to define compensating phase factors so that all modified electronic wave functions are either totally symmetric or totally antisymmetric under permutations. A detailed analysis is made to cyclic permutations in the neighborhood of Dnh symmetry, which can be extended by continuity arguments to more general configurations, and criteria are obtained for sign changes. There is a qualitative discussion of the treatment of more general permutations.

  17. SUPERFUND SOILS DATA MANAGEMENT SYSTEM

    EPA Science Inventory

    This paper describes the Superfund Soil Data Management System (DMS), a PC-based data system being developed by the U.S. Environmental Protection Agency (EPA) in its effort to manage and evaluate treatment and performance data for contaminated soil, sludge, and debris. his system...

  18. Web-Based Evaluation System for Learning Management Systems

    ERIC Educational Resources Information Center

    Momani, Alaa

    2010-01-01

    E-learning systems have become an issue in recent years. A learning management system (LMS) is an electronic environment helps the educational society to communicate, exchange information, manage, and schedule the learning process. This study has provided a web-based evaluation system that may help the users to choose the convenient system…

  19. Swiss identity smells like chocolate: Social identity shapes olfactory judgments

    PubMed Central

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.

    2016-01-01

    There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715

  20. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    PubMed

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  1. Configuration Management File Manager Developed for Numerical Propulsion System Simulation

    NASA Technical Reports Server (NTRS)

    Follen, Gregory J.

    1997-01-01

    One of the objectives of the High Performance Computing and Communication Project's (HPCCP) Numerical Propulsion System Simulation (NPSS) is to provide a common and consistent way to manage applications, data, and engine simulations. The NPSS Configuration Management (CM) File Manager integrated with the Common Desktop Environment (CDE) window management system provides a common look and feel for the configuration management of data, applications, and engine simulations for U.S. engine companies. In addition, CM File Manager provides tools to manage a simulation. Features include managing input files, output files, textual notes, and any other material normally associated with simulation. The CM File Manager includes a generic configuration management Application Program Interface (API) that can be adapted for the configuration management repositories of any U.S. engine company.

  2. Managing geometric information with a data base management system

    NASA Technical Reports Server (NTRS)

    Dube, R. P.

    1984-01-01

    The strategies for managing computer based geometry are described. The computer model of geometry is the basis for communication, manipulation, and analysis of shape information. The research on integrated programs for aerospace-vehicle design (IPAD) focuses on the use of data base management system (DBMS) technology to manage engineering/manufacturing data. The objectives of IPAD is to develop a computer based engineering complex which automates the storage, management, protection, and retrieval of engineering data. In particular, this facility must manage geometry information as well as associated data. The approach taken on the IPAD project to achieve this objective is discussed. Geometry management in current systems and the approach taken in the early IPAD prototypes are examined.

  3. 20 CFR 632.76 - Program management systems.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 3 2011-04-01 2011-04-01 false Program management systems. 632.76 Section... management systems. (a) All Native American grantees shall establish management information systems to... for the overall management of all programs including: (1) Eligibility verification systems as...

  4. dCache, towards Federated Identities & Anonymized Delegation

    NASA Astrophysics Data System (ADS)

    Ashish, A.; Millar, AP; Mkrtchyan, T.; Fuhrmann, P.; Behrmann, G.; Sahakyan, M.; Adeyemi, O. S.; Starek, J.; Litvintsev, D.; Rossi, A.

    2017-10-01

    For over a decade, dCache has relied on the authentication and authorization infrastructure (AAI) offered by VOMS, Kerberos, Xrootd etc. Although the established infrastructure has worked well and provided sufficient security, the implementation of procedures and the underlying software is often seen as a burden, especially by smaller communities trying to adopt existing HEP software stacks [1]. Moreover, scientists are increasingly dependent on service portals for data access [2]. In this paper, we describe how federated identity management systems can facilitate the transition from traditional AAI infrastructure to novel solutions like OpenID Connect. We investigate the advantages offered by OpenID Connect in regards to ‘delegation of authentication’ and ‘credential delegation for offline access’. Additionally, we demonstrate how macaroons can provide a more fine-granular authorization mechanism that supports anonymized delegation.

  5. GNSS-based emergency management system

    NASA Astrophysics Data System (ADS)

    Wu, Yuhang; Chen, Xiuwan; Ma, Lei

    2009-06-01

    Public safety and public service is a particularly challenging task. The questions of how to use the limited resources efficiently, how to improve the Government's emergency rapid response and ability of risk resistance, and how to provide a more efficient emergency service for the public, have increasingly become the focus to strengthen urban management. Emergency Response Management System is a highly efficient and powerful command system dealing with natural and social disasters, by using all aspects of the force being gathered in a short period of time, sudden events can be handled efficiently, and further development of the incident can be controlled. In this paper, based on the analysis of development status of the emergency management system at home and abroad, and the key technologies of the emergency management system based on GNSS, research and development on emergency command system based on GNSS has been done. Meanwhile, test in Sichuan earthquake has also been carried out. Practice in Sichuan province earthquake relief work has proved that the emergency management command system based on GNSS can play the advantage function and exert the maximum potential, and can play the role of "lifeline" in the critical moment.

  6. Advanced Distribution Management Systems | Grid Modernization | NREL

    Science.gov Websites

    Advanced Distribution Management Systems Advanced Distribution Management Systems Electric utilities are investing in updated grid technologies such as advanced distribution management systems to management testbed for cyber security in power systems. The "advanced" elements of advanced

  7. Tank waste remediation system systems engineering management plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peck, L.G.

    1998-01-08

    This Systems Engineering Management Plan (SEMP) describes the Tank Waste Remediation System (TWRS) implementation of the US Department of Energy (DOE) systems engineering policy provided in 97-IMSD-193. The SEMP defines the products, process, organization, and procedures used by the TWRS Project to implement the policy. The SEMP will be used as the basis for tailoring the systems engineering applications to the development of the physical systems and processes necessary to achieve the desired end states of the program. It is a living document that will be revised as necessary to reflect changes in systems engineering guidance as the program evolves.more » The US Department of Energy-Headquarters has issued program management guidance, DOE Order 430. 1, Life Cycle Asset Management, and associated Good Practice Guides that include substantial systems engineering guidance.« less

  8. 14 CFR § 1212.705 - System manager.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false System manager. § 1212.705 Section § 1212... NASA Authority and Responsibilities § 1212.705 System manager. (a) Each system manager is responsible for the following with regard to the system of records over which the system manager has cognizance...

  9. Implementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hansen, Randy R.; Bass, Robert B.; Kouzes, Richard T.

    2003-01-20

    This paper provides a brief overview of the implementation of the Advanced Encryption Standard (AES) as a hash function for confirming the identity of software resident on a computer system. The PNNL Software Authentication team chose to use a hash function to confirm software identity on a system for situations where: (1) there is limited time to perform the confirmation and (2) access to the system is restricted to keyboard or thumbwheel input and output can only be displayed on a monitor. PNNL reviewed three popular algorithms: the Secure Hash Algorithm - 1 (SHA-1), the Message Digest - 5 (MD-5),more » and the Advanced Encryption Standard (AES) and selected the AES to incorporate in software confirmation tool we developed. This paper gives a brief overview of the SHA-1, MD-5, and the AES and sites references for further detail. It then explains the overall processing steps of the AES to reduce a large amount of generic data-the plain text, such is present in memory and other data storage media in a computer system, to a small amount of data-the hash digest, which is a mathematically unique representation or signature of the former that could be displayed on a computer's monitor. This paper starts with a simple definition and example to illustrate the use of a hash function. It concludes with a description of how the software confirmation tool uses the hash function to confirm the identity of software on a computer system.« less

  10. AOIPS water resources data management system

    NASA Technical Reports Server (NTRS)

    Merritt, E. S.; Shotwell, R. L.; Place, M. C.; Belknap, N. J.

    1976-01-01

    A geocoded data management system applicable for hydrological applications was designed to demonstrate the utility of the Atmospheric and Oceanographic Information Processing System (AOIPS) for hydrological applications. Within that context, the geocoded hydrology data management system was designed to take advantage of the interactive capability of the AOIPS hardware. Portions of the Water Resource Data Management System which best demonstrate the interactive nature of the hydrology data management system were implemented on the AOIPS. A hydrological case study was prepared using all data supplied for the Bear River watershed located in northwest Utah, southeast Idaho, and western Wyoming.

  11. Pakistan's health management information system: health managers' perspectives.

    PubMed

    Qazi, Muhammad Suleman; Ali, Moazzam

    2009-01-01

    To explore the perceptions of health managers regarding Health Management Information System (HMIS), within their organizational setting and in the context of decentralization process in Pakistan. Owing to the importance of HMIS as a decision making tool and the dependency for its effectiveness on the field-managers who are the key stake holders, a qualitative research was planned to explore, understand, and describe the perceptions of health managers regarding HMIS within their organizational setting in Pakistan. The study was carried out in seven selected districts in all provinces of Pakistan. The strengths highlighted were the sustainability of system even after suspension of funds from donors; vast coverage of over ten thousand health facilities, logistics and drug support systems. The weaknesses included scarcity of resources (i.e. skilled personnel and financial resources), contentious quality and underutilization of data; lack of motivation and feedback among health managers. There is a need to instigate organizational development and institutional strengthening initiatives. These may include defining the structure of organizations; specifying the roles, responsibilities and defining a career structure; managing resources; overhauling the training activity, right from needs assessment to evaluation; creating sense of responsibility; motivating the staff; giving incentives for good work and inculcating work ethics.

  12. The importance of values in shaping how health systems governance and management can support universal health coverage.

    PubMed

    Fattore, Giovanni; Tediosi, Fabrizio

    2013-01-01

    In this article, we use cultural theory to investigate the nature of health systems governance and management, showing that it may be helpful in identifying key aspects of the debate about how to promote universal health coverage. Cultural theory argues that "how" we govern and manage health services depends on what we think about the nature of government organizations and the legitimacy of their scope of action. The values that are implied by universal health coverage underlie choices about "how" health systems are governed and their organizations are managed. We draw two main conclusions. First, the translation of principles and goals into practice requires exceptional efforts to design adequate decision-making arrangements (the essence of governance) and management practices. Management and governance, or "how" policies are decided and conducted, are not secondary to the selection of the best policy solutions (the "what"). Second, governance and management solutions are not independent of the values that they are expected to serve. Instead, they should be designed to be consonant with these values. Cultural theory suggests-and experience supports-the idea that "group identity" is favorable for shaping different forms of social life and public administrations. This approach should thus be a starting point for those who strive to obtain universal health coverage. Copyright © 2013 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  13. The event-related potential component P3a is diminished by identical deviance repetition, but not by non-identical repetitions.

    PubMed

    Rosburg, Timm; Weigl, Michael; Thiel, Ronja; Mager, Ralph

    2018-05-01

    Mismatch negativity (MMN) represents an event-related potential (ERP) component which is elicited by deviant sound events in an otherwise regular, repetitive stimulation. The MMN amplitude typically decreases when two identical deviants are presented in direct succession, but it remains stable when the two deviants vary from the standard in different features. Less is known about such repetition effects on another ERP component, the P3a, which usually follows the MMN. In the current study, we investigated how the P3a was affected by identical and non-identical repetitions of sound deviants. The ERP analysis revealed that the P3a amplitudes were strongly diminished when the repeated deviants were identical, but the P3a remained stable when the repeated deviants varied. The findings suggest that not only the deviance detection system, as reflected in the MMN, but also subsequent attention switch systems, as reflected in the P3a, operate independently across different sound features.

  14. gLExec and MyProxy integration in the ATLAS/OSG PanDA workload management system

    NASA Astrophysics Data System (ADS)

    Caballero, J.; Hover, J.; Litmaath, M.; Maeno, T.; Nilsson, P.; Potekhin, M.; Wenaus, T.; Zhao, X.

    2010-04-01

    Worker nodes on the grid exhibit great diversity, making it difficult to offer uniform processing resources. A pilot job architecture, which probes the environment on the remote worker node before pulling down a payload job, can help. Pilot jobs become smart wrappers, preparing an appropriate environment for job execution and providing logging and monitoring capabilities. PanDA (Production and Distributed Analysis), an ATLAS and OSG workload management system, follows this design. However, in the simplest (and most efficient) pilot submission approach of identical pilots carrying the same identifying grid proxy, end-user accounting by the site can only be done with application-level information (PanDA maintains its own end-user accounting), and end-user jobs run with the identity and privileges of the proxy carried by the pilots, which may be seen as a security risk. To address these issues, we have enabled PanDA to use gLExec, a tool provided by EGEE which runs payload jobs under an end-user's identity. End-user proxies are pre-staged in a credential caching service, MyProxy, and the information needed by the pilots to access them is stored in the PanDA DB. gLExec then extracts from the user's proxy the proper identity under which to run. We describe the deployment, installation, and configuration of gLExec, and how PanDA components have been augmented to use it. We describe how difficulties were overcome, and how security risks have been mitigated. Results are presented from OSG and EGEE Grid environments performing ATLAS analysis using PanDA and gLExec.

  15. Safety Management Systems.

    ERIC Educational Resources Information Center

    Fido, A. T.; Wood, D. O.

    This document discusses the issues that need to be considered by the education and training system as it responds to the changing needs of industry in Great Britain. Following a general introduction, the development of quality management ideas is traced. The underlying principles of safety and risk management are clarified and the implications of…

  16. Vocational identity, positive affect, and career thoughts in a group of young adult central nervous system cancer survivors.

    PubMed

    Lange, Dustin D; Wong, Alex W K; Strauser, David R; Wagner, Stacia

    2014-12-01

    The aims of this study were as follows: (a) to compare levels of career thoughts and vocational identity between young adult childhood central nervous system (CNS) cancer survivors and noncancer peers and (b) to investigate the contribution of vocational identity and affect on career thoughts among cancer survivors. Participants included 45 young adult CNS cancer survivors and a comparison sample of 60 college students. Participants completed Career Thoughts Inventory, My Vocational Situation, and the Positive and Negative Affect Schedule. Multivariate analysis of variance and multiple regression analysis were used to analyze the data in this study. CNS cancer survivors had a higher level of decision-making confusion than the college students. Multiple regression analysis indicated that vocational identity and positive affect significantly predicted the career thoughts of CNS survivors. The differences in decision-making confusion suggest that young adult CNS survivors would benefit from interventions that focus on providing knowledge of how to make decisions, while increasing vocational identity and positive affect for this specific population could also be beneficial.

  17. Computer memory management system

    DOEpatents

    Kirk, III, Whitson John

    2002-01-01

    A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

  18. Contemplation and the "Performative Absolute": Submission and Identity in Managerial Modernity

    ERIC Educational Resources Information Center

    Roberts, Richard H.

    2013-01-01

    Practices derived from the "vita contemplativa" and other spiritual sources are drawn upon by management, but as the power of human resources management (HRM) is extended so the relationship between "contemplation" and the surrender of self-identity required by HRM demands critical examination. The conscious construction of the…

  19. JAX Colony Management System (JCMS): an extensible colony and phenotype data management system.

    PubMed

    Donnelly, Chuck J; McFarland, Mike; Ames, Abigail; Sundberg, Beth; Springer, Dave; Blauth, Peter; Bult, Carol J

    2010-04-01

    The Jackson Laboratory Colony Management System (JCMS) is a software application for managing data and information related to research mouse colonies, associated biospecimens, and experimental protocols. JCMS runs directly on computers that run one of the PC Windows operating systems, but can be accessed via web browser interfaces from any computer running a Windows, Macintosh, or Linux operating system. JCMS can be configured for a single user or multiple users in small- to medium-size work groups. The target audience for JCMS includes laboratory technicians, animal colony managers, and principal investigators. The application provides operational support for colony management and experimental workflows, sample and data tracking through transaction-based data entry forms, and date-driven work reports. Flexible query forms allow researchers to retrieve database records based on user-defined criteria. Recent advances in handheld computers with integrated barcode readers, middleware technologies, web browsers, and wireless networks add to the utility of JCMS by allowing real-time access to the database from any networked computer.

  20. Managing Digital Identity on Twitter: The Case of School Administrators

    ERIC Educational Resources Information Center

    Cho, Vincent; Jimerson, Jo Beth

    2017-01-01

    What does it mean to be and to act like a school leader online? Although many school leaders might be comfortable navigating issues of identity in face-to-face environments, online environments may present new and unprecedented challenges. These challenges may range from concerns about privacy and surveillance to questions about how best to…

  1. NICA project management information system

    NASA Astrophysics Data System (ADS)

    Bashashin, M. V.; Kekelidze, D. V.; Kostromin, S. A.; Korenkov, V. V.; Kuniaev, S. V.; Morozov, V. V.; Potrebenikov, Yu. K.; Trubnikov, G. V.; Philippov, A. V.

    2016-09-01

    The science projects growth, changing of the efficiency criteria during the project implementation require not only increasing of the management specialization level but also pose the problem of selecting the effective planning methods, monitoring of deadlines and interaction of participants involved in research projects. This paper is devoted to choosing the project management information system for the new heavy-ion collider NICA (Nuclotron based Ion Collider fAcility). We formulate the requirements for the project management information system with taking into account the specifics of the Joint Institute for Nuclear Research (JINR, Dubna, Russia) as an international intergovernmental research organization, which is developed on the basis of a flexible and effective information system for the NICA project management.

  2. Integrated Computer System of Management in Logistics

    NASA Astrophysics Data System (ADS)

    Chwesiuk, Krzysztof

    2011-06-01

    This paper aims at presenting a concept of an integrated computer system of management in logistics, particularly in supply and distribution chains. Consequently, the paper includes the basic idea of the concept of computer-based management in logistics and components of the system, such as CAM and CIM systems in production processes, and management systems for storage, materials flow, and for managing transport, forwarding and logistics companies. The platform which integrates computer-aided management systems is that of electronic data interchange.

  3. 5 CFR 430.304 - SES performance management systems.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 1 2013-01-01 2013-01-01 false SES performance management systems. 430... PERFORMANCE MANAGEMENT Managing Senior Executive Performance § 430.304 SES performance management systems. (a... or more performance management systems for its senior executives. (b) Performance management systems...

  4. 5 CFR 430.304 - SES performance management systems.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 1 2014-01-01 2014-01-01 false SES performance management systems. 430... PERFORMANCE MANAGEMENT Managing Senior Executive Performance § 430.304 SES performance management systems. (a... or more performance management systems for its senior executives. (b) Performance management systems...

  5. 5 CFR 430.304 - SES performance management systems.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 1 2012-01-01 2012-01-01 false SES performance management systems. 430... PERFORMANCE MANAGEMENT Managing Senior Executive Performance § 430.304 SES performance management systems. (a... or more performance management systems for its senior executives. (b) Performance management systems...

  6. 5 CFR 430.304 - SES performance management systems.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false SES performance management systems. 430... PERFORMANCE MANAGEMENT Managing Senior Executive Performance § 430.304 SES performance management systems. (a... or more performance management systems for its senior executives. (b) Performance management systems...

  7. Uniform Food Service Management System.

    DTIC Science & Technology

    The study report contains an analysis of the management of food service within the Office of the Secretary of Defense and the military departments...Procedures and organizations which inhibit an optimum food service management system are discussed. Recommendations are made for the establishment of...a uniform food service management system in the Department of Defense which will be responsive to present day requirements in food service operations

  8. "Unhomely" Academic Developer Identities: More Post-Colonial Explorations

    ERIC Educational Resources Information Center

    Manathunga, Catherine

    2007-01-01

    Academic developers are very often disciplinary migrants, performing hybrid, liminal roles at the "fault lines" between teachers and learners, between academics and managers, and between teaching and research. As a result, their identities as scholars can be described as "unhomely." While this in-between space is uncomfortable…

  9. THE HOW AND WHY OF THE MOVEMENT SYSTEM AS THE IDENTITY OF PHYSICAL THERAPY

    PubMed Central

    2017-01-01

    The Movement System was adopted as the identity of physical therapy as one of the 8 guiding principles accompanying the Vision Statement of 2013. At its inception physical therapy was considered more of a technical field rather than that of a professional field. Physicians were to diagnose the patient's problem and the therapist was to follow the prescription provided by the physician with the primary purpose being to relieve symptoms such as pain or muscle weakness. Even by the 1960's, the prescription became more of a referral and there was recognition that therapists were making decisions about the patient's treatment and discharge disposition. The role of the physical therapist in pathokinesiologic problems has been well accepted over the years but as insights are gained about the role of movement in musculoskeletal pain, the concept of kinesiopathologic problems is being defined. Whether the movement dysfunction is from a pathokinesiologic or a kinesiopathologic mechanisms, the underlying physiologic process is movement which is the composite action of the movement system. This article provides a brief discussion of the steps leading to promotion of the identity and the reasons that further defining and promoting the movement system as the body system for which physical therapists are responsible is necessary for the full recognition of the profession. As suggested by the kinesiopathologic concept of movement inducing pathology, physical therapists can address the cause of musculoskeletal problems and not just symptoms or consequences such as the pathoanatomic problem. Level of Evidence: 5 PMID:29158948

  10. The importance of management information systems in a managed care environment.

    PubMed

    Porro, M R; Brill, K R

    1995-06-01

    Keys to successful information systems for home care providers are planning and control. With managed care's emphasis on data, agencies need to have information systems that can handle the demands managed care puts on agencies today--planning before hurrying to install a system will ensure control as the managed care contracts add up.

  11. Ambiguous genitalia, gender-identity problems, and sex reassignment.

    PubMed

    Dittmann, R W

    1998-01-01

    This article discusses general issues with regard to gender-identity problems, sex reassignment, and clinical management in patients with ambiguous genitalia, based on a detailed case history of a patient with penile agenesis who has been followed more than 20 years. After initial uncertainty, the patient began to grow up as a boy, lived from the fourth year of life as a girl and young woman, and lived from late puberty on as a man. Over his lifetime he experienced extensive corrective surgery plus hormonal substitution therapy. Pre- and perinatal hormonal conditions, phenomenology of the genitalia, sex of rearing, timing of sex reassignment and corrective surgery, for example, appear to be important components for the development of gender-role behavior, gender identity, and sexual orientation of intersex patients. Findings and retrospective considerations for this patient suggest the need for careful differential activities in diagnostic workup, approaches to sex assignment and possible reassignment, and the clinical management of patients and families.

  12. Residential load management system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Uhr, C.W.

    1986-03-01

    The MAX load management system marketed by the UHR Corporation is described. The system completely replaces conventional heating, cooling, and hot water equipment. It is designed to reduce significantly the home's peak demand during the electric utility's system-wide peak load periods while at the same time maintain the homeowner's comfort. The integration of microprocessor, thermal storage, and heat pump technologies allows for broad flexibility in terms of tailoring the system to a specific electric utility's needs. Twelve pilot systems installed in Northern Virginia outside of Washington, DC have been operational since early 1985. The test results to date have confirmedmore » both the system's load management capability and its comfort improvement characteristics. The fundamental characteristics and hardware for the system are described. 9 figures.« less

  13. 20 CFR 632.76 - Program management systems.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... NATIVE AMERICAN EMPLOYMENT AND TRAINING PROGRAMS Program Design and Management § 632.76 Program management systems. (a) All Native American grantees shall establish management information systems to... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Program management systems. 632.76 Section...

  14. Management and control of self-replicating systems: A systems model

    NASA Technical Reports Server (NTRS)

    Vontiesenhausen, G.

    1982-01-01

    In 1980, a conceptual engineering approach to self-replicating systems was achieved. The design was based on von Newmann's kinematic version of self-replicating automata. The systems management and control and the organization of the control elements are reported. After developing the functional requirements of such a system, a hierarchy of three management and control levels is described. These are an autonomous, an external, and an intelligent management and control system. Systems recycling, systems specialization, and information replication are discussed.

  15. Site-specific nutrient management systems

    USDA-ARS?s Scientific Manuscript database

    Site-specific nutrient management systems were created to manage for spatial and temporal variability in biophysical factors that determine the availability and demand of crop nutrients. These systems differ among geographical regions in the information utilized and way they operate to accomplish th...

  16. IdentityMap Visualization of the Super Identity Model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    The Super Identity Model is a collaboration with six United Kingdom universities to develop use cases used to piece together a person's identity across biological, cyber, psychological, and biographical domains. PNNL visualized the model in a web-based application called IdentityMap. This is the first step in a promising new field of research. Interested future collaborators are welcome to find out more by emailing superid@pnnl.gov.

  17. IdentityMap Visualization of the Super Identity Model

    ScienceCinema

    None

    2018-06-08

    The Super Identity Model is a collaboration with six United Kingdom universities to develop use cases used to piece together a person's identity across biological, cyber, psychological, and biographical domains. PNNL visualized the model in a web-based application called IdentityMap. This is the first step in a promising new field of research. Interested future collaborators are welcome to find out more by emailing superid@pnnl.gov.

  18. Patient identity management for secondary use of biomedical research data in a distributed computing environment.

    PubMed

    Nitzlnader, Michael; Schreier, Günter

    2014-01-01

    Dealing with data from different source domains is of increasing importance in today's large scale biomedical research endeavours. Within the European Network for Cancer research in Children and Adolescents (ENCCA) a solution to share such data for secondary use will be established. In this paper the solution arising from the aims of the ENCCA project and regulatory requirements concerning data protection and privacy is presented. Since the details of secondary biomedical dataset utilisation are often not known in advance, data protection regulations are met with an identity management concept that facilitates context-specific pseudonymisation and a way of data aggregation using a hidden reference table later on. Phonetic hashing is proposed to prevent duplicated patient registration and re-identification of patients is possible via a trusted third party only. Finally, the solution architecture allows for implementation in a distributed computing environment, including cloud-based elements.

  19. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    PubMed

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  20. Y-12 Integrated Materials Management System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alspaugh, D. H.; Hickerson, T. W.

    2002-06-03

    The Integrated Materials Management System, when fully implemented, will provide the Y-12 National Security Complex with advanced inventory information and analysis capabilities and enable effective assessment, forecasting and management of nuclear materials, critical non-nuclear materials, and certified supplies. These capabilities will facilitate future Y-12 stockpile management work, enhance interfaces to existing National Nuclear Security Administration (NNSA) corporate-level information systems, and enable interfaces to planned NNSA systems. In the current national nuclear defense environment where, for example, weapons testing is not permitted, material managers need better, faster, more complete information about material properties and characteristics. They now must manage non-special nuclearmore » material at the same high-level they have managed SNM, and information capabilities about both must be improved. The full automation and integration of business activities related to nuclear and non-nuclear materials that will be put into effect by the Integrated Materials Management System (IMMS) will significantly improve and streamline the process of providing vital information to Y-12 and NNSA managers. This overview looks at the kinds of information improvements targeted by the IMMS project, related issues, the proposed information architecture, and the progress to date in implementing the system.« less

  1. Software And Systems Engineering Risk Management

    DTIC Science & Technology

    2010-04-01

    RSKM 2004 COSO Enterprise RSKM Framework 2006 ISO/IEC 16085 Risk Management Process 2008 ISO/IEC 12207 Software Lifecycle Processes 2009 ISO/IEC...1 Software And Systems Engineering Risk Management John Walz VP Technical and Conferences Activities, IEEE Computer Society Vice-Chair Planning...Software & Systems Engineering Standards Committee, IEEE Computer Society US TAG to ISO TMB Risk Management Working Group Systems and Software

  2. Evolution from safety management system (SMS) to HSE MS: Incorporating health aspects into the HSE management system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jong, G. de

    1996-12-31

    There is increasing recognition within the E&P industry that protection and promotion of the health of people at work is more than taking care of individual health. It is an organizational issue which can be managed using the same principles as for safety and environment. The synergy`s with safety and environmental management provide the link with the management system. However line managers need to under the critical Health issues: what are they are they relevant? How do we manage them? what are the standards? What are the management tools to be used? How do we monitor performance? What is themore » role of the line? What is the role of the health advisers? What training and competencies are needed for health management? What are the benefits? These questions have to be clarified before acceptance can be achieved for full integration of Health aspects into the HSE Management System. Health Risk Assessment was developed as a tool for systematic identification and assessment of health hazards and risks. It specifies the need for and type of controls and recovery measures, which can subsequently be incorporated in HSE Management System and HSE Cases. Our experience to date indicates that Health can successfully be integrated in HSE Management Systems and HSE Cases by using the same principles as developed for Safety Management Systems and Safety Cases. There are still many problems which need to be addressed but the methodology used appears to be sound and will eventually enhance line management understanding of the health management aspects relevant to the E&P Industry.« less

  3. Navigating Identities: Subtle and Public Agency of Bicultural Gay Youth.

    PubMed

    Cense, Marianne; Ganzevoort, R Ruard

    2017-01-01

    Young people who discover their sexual attraction to people of the same sex often go through a period of ambivalence or distress, especially when they grow up in an environment that condemns homosexuality. The Dutch sociopolitical context makes the expression of same-sex desires among those with non-Dutch roots even more complicated and risky, as prevailing schemes of interpretation render the two identities incompatible. This study explores the expressions of same-sex desires and identities as well as the different forms of agency of bicultural gay youth. In-depth interviews with 14 young adults reveal how young people negotiate bicultural identities in Dutch society that brings to the fore complexities in managing diverse sexual identities and strong religious and cultural affiliations in tandem. Their strategies have the effect of questioning dominant discourses and transcend the oppositional dichotomy between sexual and ethnic forms of sociocultural otherness.

  4. I-15 integrated corridor management system : project management plan.

    DOT National Transportation Integrated Search

    2011-06-01

    The Project Management Plan (PMP) assists the San Diego ICM Team by defining a procedural framework for management and control of the I-15 Integrated Corridor Management Demonstration Project, and development and deployment of the ICM System. The PMP...

  5. 23 CFR 970.204 - Management systems requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... the management systems and their associated databases; and (5) A process for data collection, processing, analysis and updating for each management system. (d) All management systems will use databases with a geographical reference system that can be used to geolocate all database information. (e...

  6. 23 CFR 970.204 - Management systems requirements.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... the management systems and their associated databases; and (5) A process for data collection, processing, analysis and updating for each management system. (d) All management systems will use databases with a geographical reference system that can be used to geolocate all database information. (e...

  7. 23 CFR 970.204 - Management systems requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... the management systems and their associated databases; and (5) A process for data collection, processing, analysis and updating for each management system. (d) All management systems will use databases with a geographical reference system that can be used to geolocate all database information. (e...

  8. 23 CFR 970.204 - Management systems requirements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... the management systems and their associated databases; and (5) A process for data collection, processing, analysis and updating for each management system. (d) All management systems will use databases with a geographical reference system that can be used to geolocate all database information. (e...

  9. Hybrid power management system and method

    NASA Technical Reports Server (NTRS)

    Eichenberg, Dennis J. (Inventor)

    2007-01-01

    A system and method for hybrid power management. The system includes photovoltaic cells, ultracapacitors, and pulse generators. In one embodiment, the hybrid power management system is used to provide power for a highway safety flasher.

  10. Hybrid Power Management System and Method

    NASA Technical Reports Server (NTRS)

    Eichenberg, Dennis J. (Inventor)

    2008-01-01

    A system and method for hybrid power management. The system includes photovoltaic cells, ultracapacitors, and pulse generators. In one embodiment, the hybrid power management system is used to provide power for a highway safety flasher.

  11. Stories and metaphors in the sensemaking of multiple primary health care organizational identities.

    PubMed

    Rodríguez, Charo; Bélanger, Emmanuelle

    2014-03-04

    The Quebec primary health care delivery system has experienced numerous reforms over the last 15 years. In this study, we sought to examine how managers and primary care providers made sense of the creation of successive new primary care organizational forms. We conducted a longitudinal qualitative case study in a primary care practice group located in Montreal, Quebec, for over 6 years (2002 to 2008). The data sources for the study include 31 semi-structured interviews with key informants, in-situ observations of group meetings, as well as documents and field notes. Textual material was submitted to narrative and metaphor analysis. The core metaphor of the journey came from a set of stories in which the members of this primary care group depicted the processes undertaken towards developing a multidisciplinary cooperative practice, which include an uneasy departure, uncertainty about the destination, conflict among members who jump ship or stay on board, negotiations about the itinerary, and, finally, enduring challenges in leading the way and being pioneers of change in the organization of primary care in their institutional context. Identification with the initial family medicine unit identity was persistent over time, but successive reforms further enriched its meaning as it became a multidisciplinary primary care practice pioneering organizational change. In order to support primary care reforms in complex institutional fields, this study proposes that decision-makers undertake a journey in which they recognize both the need to capitalize on existing meaningful and legitimated organizational identities, as well as the necessity for collective leadership in the management of multiple organizational identities over time.

  12. Information management systems for pharmacogenomics.

    PubMed

    Thallinger, Gerhard G; Trajanoski, Slave; Stocker, Gernot; Trajanoski, Zlatko

    2002-09-01

    The value of high-throughput genomic research is dramatically enhanced by association with key patient data. These data are generally available but of disparate quality and not typically directly associated. A system that could bring these disparate data sources into a common resource connected with functional genomic data would be tremendously advantageous. However, the integration of clinical and accurate interpretation of the generated functional genomic data requires the development of information management systems capable of effectively capturing the data as well as tools to make that data accessible to the laboratory scientist or to the clinician. In this review these challenges and current information technology solutions associated with the management, storage and analysis of high-throughput data are highlighted. It is suggested that the development of a pharmacogenomic data management system which integrates public and proprietary databases, clinical datasets, and data mining tools embedded in a high-performance computing environment should include the following components: parallel processing systems, storage technologies, network technologies, databases and database management systems (DBMS), and application services.

  13. Virtual Network Configuration Management System for Data Center Operations and Management

    NASA Astrophysics Data System (ADS)

    Okita, Hideki; Yoshizawa, Masahiro; Uehara, Keitaro; Mizuno, Kazuhiko; Tarui, Toshiaki; Naono, Ken

    Virtualization technologies are widely deployed in data centers to improve system utilization. However, they increase the workload for operators, who have to manage the structure of virtual networks in data centers. A virtual-network management system which automates the integration of the configurations of the virtual networks is provided. The proposed system collects the configurations from server virtualization platforms and VLAN-supported switches, and integrates these configurations according to a newly developed XML-based management information model for virtual-network configurations. Preliminary evaluations show that the proposed system helps operators by reducing the time to acquire the configurations from devices and correct the inconsistency of operators' configuration management database by about 40 percent. Further, they also show that the proposed system has excellent scalability; the system takes less than 20 minutes to acquire the virtual-network configurations from a large scale network that includes 300 virtual machines. These results imply that the proposed system is effective for improving the configuration management process for virtual networks in data centers.

  14. 23 CFR 971.204 - Management systems requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... maintain the management systems and their associated databases; and (5) A process for data collection, processing, analysis, and updating for each management system. (c) All management systems will use databases with a common or coordinated reference system, that can be used to geolocate all database information...

  15. 23 CFR 971.204 - Management systems requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... maintain the management systems and their associated databases; and (5) A process for data collection, processing, analysis, and updating for each management system. (c) All management systems will use databases with a common or coordinated reference system, that can be used to geolocate all database information...

  16. 23 CFR 971.204 - Management systems requirements.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... maintain the management systems and their associated databases; and (5) A process for data collection, processing, analysis, and updating for each management system. (c) All management systems will use databases with a common or coordinated reference system, that can be used to geolocate all database information...

  17. 23 CFR 971.204 - Management systems requirements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... maintain the management systems and their associated databases; and (5) A process for data collection, processing, analysis, and updating for each management system. (c) All management systems will use databases with a common or coordinated reference system, that can be used to geolocate all database information...

  18. Developmental endocrine influences on gender identity: implications for management of disorders of sex development.

    PubMed

    Byne, William

    2006-11-01

    When a baby is born, the first medical pronouncement is usually, "It's a boy," or "It's a girl." In most cases, this pronouncement is based simply upon the appearance of the child's external genitalia. Due to variations in the process of sexual differentiation, sometimes the gender that should be assigned is not apparent from inspection of the external genitalia, either because they are "ambiguous" or because their appearance is not congruent with the internal anatomy. Decisions must be made not only about the most appropriate gender to assign the infant but also about the medical and rearing practices that will facilitate optimal psychological development and quality of life for the affected individual. This article will review the approach to managing gender disorders that has evolved since the 1950s. Three issues are identified as central to current shifts that are occurring in the management of these disorders: (a) increased understanding of the biological substrates of gender identity; (b) questions regarding the indications for irreversible cosmetic genital surgeries as a means of reinforcing gender assignments in infancy, and (c) ethical issues pertaining to informed consent and who is entitled to give it, particularly with regard to surgical gender reassignments in infancy. In keeping with the neuropsychiatry theme of this issue, the focus of this article is on prenatal sexual differentiation of the brain as it pertains to the question of psychosexual neutrality at birth.

  19. Exploring athletic identity in elite-level English youth football: a cross-sectional approach.

    PubMed

    Mitchell, Tom O; Nesti, Mark; Richardson, David; Midgley, Adrian W; Eubank, Martin; Littlewood, Martin

    2014-01-01

    This study is the first empirical investigation that has explored levels of athletic identity in elite-level English professional football. The importance of understanding athletes' psychological well-being within professional sport has been well documented. This is especially important within the professional football industry, given the high attrition rate (Anderson, G., & Miller, R. M. (2011). The academy system in English professional football: Business value or following the herd? University of Liverpool, Management School Research Paper Series. Retrieved from http://www.liv.ac.uk/managementschool/research/working%20papers/wp201143.pdf ) and distinct occupational practices (Roderick, M. (2006). The work of professional football. A labour of love? London: Routledge). A total of 168 elite youth footballers from the English professional football leagues completed the Athletic Identity Measurement Scale (AIMS). Multilevel modelling was used to examine the effect of playing level, living arrangements and year of apprentice on the total AIMS score and its subscales (i.e., social identity, exclusivity and negative affectivity). Football club explained 30% of the variance in exclusivity among players (P = .022). Mean social identity was significantly higher for those players in the first year of their apprenticeship compared to the second year (P = .025). All other effects were not statistically significant (P > .05). The novel and unique findings have practical implications in the design and implementation of career support strategies with respect to social identity. This may facilitate the maintenance of motivation over a 2-year apprenticeship and positively impact on performance levels within the professional football environment.

  20. Sewer System Management Plan.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Holland, Robert C.

    A Sewer System Management Plan (SSMP) is required by the State Water Resources Control Board (SWRCB) Order No. 2006-0003-DWQ Statewide General Waste Discharge Requirements (WDR) for Sanitary Sewer Systems (General Permit). DOE, National Nuclear Security Administration (NNSA), Sandia Field Office has filed a Notice of Intent to be covered under this General Permit. The General Permit requires a proactive approach to reduce the number and frequency of sanitary sewer overflows (SSOs) within the State. SSMPs must include provisions to provide proper and efficient management, operation, and maintenance of sanitary sewer systems and must contain a spill response plan.

  1. 10 CFR 600.323 - Property management system.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Property management system. 600.323 Section 600.323 Energy....323 Property management system. The recipient's property management system must include the following... existence, current utilization, and continued need for the property. (d) A control system must be in effect...

  2. 10 CFR 600.323 - Property management system.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Property management system. 600.323 Section 600.323 Energy....323 Property management system. The recipient's property management system must include the following... existence, current utilization, and continued need for the property. (d) A control system must be in effect...

  3. Ethnic Identity in Everyday Life: The Influence of Identity Development Status

    PubMed Central

    Yip, Tiffany

    2013-01-01

    The current study explores the intersection of ethnic identity development and significance in a sample of 354 diverse adolescents (mean age 14). Adolescents completed surveys 5 times a day for 1 week. Cluster analyses revealed 4 identity clusters: diffused, foreclosed, moratorium, achieved. Achieved adolescents reported the highest levels of identity salience across situations, followed by moratorium adolescents. Achieved and moratorium adolescents also reported a positive association between identity salience and private regard. For foreclosed and achieved adolescents reporting low levels of centrality, identity salience was associated with lower private regard. For foreclosed and achieved adolescents reporting high levels of centrality, identity salience was associated with higher private regard. PMID:23581701

  4. The Air Program Information Management System (APIMS)

    DTIC Science & Technology

    2011-11-02

    Technology November 2, 2011 The Air Program Information Management System (APIMS) Frank Castaneda, III, P.E. APIMS Program Manager AFCEE/TDNQ APIMS...NOV 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE The Air Program Information Management System (APIMS... Information   Management   System : Sustainability of  Enterprise air quality management system • Aspects and Impacts to Process • Auditing and Measurement

  5. Teacher Educators: Their Identities, Sub-Identities and Implications for Professional Development

    ERIC Educational Resources Information Center

    Swennen, Anja; Jones, Ken; Volman, Monique

    2010-01-01

    In this article we address the question: "What sub-identities of teacher educators emerge from the research literature about teacher educators and what are the implications of the sub-identities for the professional development of teacher educators?" Like other professional identities, the identity of teacher educators is a construction of various…

  6. Bridging Identities and Disciplines: Advances and Challenges in Understanding Multiple Identities

    ERIC Educational Resources Information Center

    Phinney, Jean S.

    2008-01-01

    The chapters in this volume address the need for a better understanding of the development of intersecting identities over age and context. The chapters provide valuable insights into the development of identities, particularly group identities. They highlight common processes across identities, such as the role of contrast and comparison and the…

  7. 48 CFR 52.204-9 - Personal Identity Verification of Contractor Personnel.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Personal Identity... Provisions and Clauses 52.204-9 Personal Identity Verification of Contractor Personnel. As prescribed in 4.1303, insert the following clause: Personal Identity Verification of Contractor Personnel (SEP 2007) (a...

  8. 48 CFR 52.204-9 - Personal Identity Verification of Contractor Personnel.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 2 2012-10-01 2012-10-01 false Personal Identity... Provisions and Clauses 52.204-9 Personal Identity Verification of Contractor Personnel. As prescribed in 4.1303, insert the following clause: Personal Identity Verification of Contractor Personnel (JAN 2011) (a...

  9. 48 CFR 52.204-9 - Personal Identity Verification of Contractor Personnel.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 2 2013-10-01 2013-10-01 false Personal Identity... Provisions and Clauses 52.204-9 Personal Identity Verification of Contractor Personnel. As prescribed in 4.1303, insert the following clause: Personal Identity Verification of Contractor Personnel (JAN 2011) (a...

  10. 48 CFR 52.204-9 - Personal Identity Verification of Contractor Personnel.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 2 2014-10-01 2014-10-01 false Personal Identity... Provisions and Clauses 52.204-9 Personal Identity Verification of Contractor Personnel. As prescribed in 4.1303, insert the following clause: Personal Identity Verification of Contractor Personnel (JAN 2011) (a...

  11. 48 CFR 52.204-9 - Personal Identity Verification of Contractor Personnel.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 2 2011-10-01 2011-10-01 false Personal Identity... Provisions and Clauses 52.204-9 Personal Identity Verification of Contractor Personnel. As prescribed in 4.1303, insert the following clause: Personal Identity Verification of Contractor Personnel (JAN 2011) (a...

  12. 32 CFR 34.23 - Property management system.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Property management system. 34.23 Section 34.23... Requirements Property Standards § 34.23 Property management system. The recipient's property management system... control system shall be in effect to insure adequate safeguards to prevent loss, damage, or theft of the...

  13. 32 CFR 34.23 - Property management system.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Property management system. 34.23 Section 34.23... Requirements Property Standards § 34.23 Property management system. The recipient's property management system... control system shall be in effect to insure adequate safeguards to prevent loss, damage, or theft of the...

  14. 36 CFR 212.5 - Road system management.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... safety or to environmental degradation. (c) Cost recovery on National Forest System roads. The Chief may... 36 Parks, Forests, and Public Property 2 2011-07-01 2011-07-01 false Road system management. 212.5... MANAGEMENT Administration of the Forest Transportation System § 212.5 Road system management. (a) Traffic...

  15. Development of Participative Management System in Learning Environment Management for Small Sized Primary Schools

    ERIC Educational Resources Information Center

    Hernthaisong, Prasertsak; Sirisuthi, Chaiyuth; Wisetrinthong, Kanjana

    2017-01-01

    The research aimed to: 1) study the factors of a participative management system in learning environment management, 2) study the current situation, desirable outcomes, and further needs for developing a participative management system in learning management, 3) develop a working participative management system, and 4) assess the system's…

  16. NASA's Risk Management System

    NASA Technical Reports Server (NTRS)

    Perera, Jeevan S.

    2013-01-01

    Phased-approach for implementation of risk management is necessary. Risk management system will be simple, accessible and promote communication of information to all relevant stakeholders for optimal resource allocation and risk mitigation. Risk management should be used by all team members to manage risks - not just risk office personnel. Each group/department is assigned Risk Integrators who are facilitators for effective risk management. Risks will be managed at the lowest-level feasible, elevate only those risks that require coordination or management from above. Risk informed decision making should be introduced to all levels of management. ? Provide necessary checks and balances to insure that risks are caught/identified and dealt with in a timely manner. Many supporting tools, processes & training must be deployed for effective risk management implementation. Process improvement must be included in the risk processes.

  17. A Dual Identity Approach for Conceptualizing and Measuring Children's Gender Identity.

    PubMed

    Martin, Carol Lynn; Andrews, Naomi C Z; England, Dawn E; Zosuls, Kristina; Ruble, Diane N

    2017-01-01

    The goal was to test a new dual identity perspective on gender identity by asking children (n = 467) in three grades (M age  = 5.7, 7.6, 9.5) to consider the relation of the self to both boys and girls. This change shifted the conceptualization of gender identity from one to two dimensions, provided insights into the meaning and measurement of gender identity, and allowed for revisiting ideas about the roles of gender identity in adjustment. Using a graphical measure to allow assessment of identity in young children and cluster analyses to determine types of identity, it was found that individual and developmental differences in how similar children feel to both genders, and these variations matter for many important personal and social outcomes. © 2016 The Authors. Child Development © 2016 Society for Research in Child Development, Inc.

  18. Integrated Systems Health Management for Intelligent Systems

    NASA Technical Reports Server (NTRS)

    Figueroa, Fernando; Melcher, Kevin

    2011-01-01

    The implementation of an integrated system health management (ISHM) capability is fundamentally linked to the management of data, information, and knowledge (DIaK) with the purposeful objective of determining the health of a system. It is akin to having a team of experts who are all individually and collectively observing and analyzing a complex system, and communicating effectively with each other in order to arrive at an accurate and reliable assessment of its health. In this paper, concepts, procedures, and approaches are presented as a foundation for implementing an intelligent systems ]relevant ISHM capability. The capability stresses integration of DIaK from all elements of a system. Both ground-based (remote) and on-board ISHM capabilities are compared and contrasted. The information presented is the result of many years of research, development, and maturation of technologies, and of prototype implementations in operational systems.

  19. Microcomputer Database Management Systems for Bibliographic Data.

    ERIC Educational Resources Information Center

    Pollard, Richard

    1986-01-01

    Discusses criteria for evaluating microcomputer database management systems (DBMS) used for storage and retrieval of bibliographic data. Two popular types of microcomputer DBMS--file management systems and relational database management systems--are evaluated with respect to these criteria. (Author/MBR)

  20. 23 CFR 970.204 - Management systems requirements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL LANDS HIGHWAYS NATIONAL PARK... the management systems and their associated databases; and (5) A process for data collection, processing, analysis and updating for each management system. (d) All management systems will use databases...

  1. ADAMS: AIRLAB data management system user's guide

    NASA Technical Reports Server (NTRS)

    Conrad, C. L.; Ingogly, W. F.; Lauterbach, L. A.

    1986-01-01

    The AIRLAB Data Management System (ADAMS) is an online environment that supports research at NASA's AIRLAB. ADAMS provides an easy to use interactive interface that eases the task of documenting and managing information about experiments and improves communication among project members. Data managed by ADAMS includes information about experiments, data sets produced, software and hardware available in AIRLAB as well as that used in a particular experiment, and an on-line engineer's notebook. The User's Guide provides an overview of the ADAMS system as well as details of the operations available within ADAMS. A tutorial section takes the user step-by-step through a typical ADAMS session. ADAMS runs under the VAX/VMS operating system and uses the ORACLE database management system and DEC/FMS (the Forms Management System). ADAMS can be run from any VAX connected via DECnet to the ORACLE host VAX. The ADAMS system is designed for simplicity, so interactions within the underlying data management system and communications network are hidden from the user.

  2. Fuel cell gas management system

    DOEpatents

    DuBose, Ronald Arthur

    2000-01-11

    A fuel cell gas management system including a cathode humidification system for transferring latent and sensible heat from an exhaust stream to the cathode inlet stream of the fuel cell; an anode humidity retention system for maintaining the total enthalpy of the anode stream exiting the fuel cell equal to the total enthalpy of the anode inlet stream; and a cooling water management system having segregated deionized water and cooling water loops interconnected by means of a brazed plate heat exchanger.

  3. Management Information System

    NASA Technical Reports Server (NTRS)

    1984-01-01

    New Automated Management Information Center (AMIC) employs innovative microcomputer techniques to create color charts, viewgraphs, or other data displays in a fraction of the time formerly required. Developed under Kennedy Space Center's contract by Boeing Services International Inc., Seattle, WA, AMIC can produce an entirely new informational chart in 30 minutes, or an updated chart in only five minutes. AMIC also has considerable potential as a management system for business firms.

  4. An Introduction to Database Management Systems.

    ERIC Educational Resources Information Center

    Warden, William H., III; Warden, Bette M.

    1984-01-01

    Description of database management systems for microcomputers highlights system features and factors to consider in microcomputer system selection. A method for ranking database management systems is explained and applied to a defined need, i.e., software support for indexing a weekly newspaper. A glossary of terms and 32-item bibliography are…

  5. Data Management System

    NASA Technical Reports Server (NTRS)

    1997-01-01

    CENTRA 2000 Inc., a wholly owned subsidiary of Auto-trol technology, obtained permission to use software originally developed at Johnson Space Center for the Space Shuttle and early Space Station projects. To support their enormous information-handling needs, a product data management, electronic document management and work-flow system was designed. Initially, just 33 database tables comprised the original software, which was later expanded to about 100 tables. This system, now called CENTRA 2000, is designed for quick implementation and supports the engineering process from preliminary design through release-to-production. CENTRA 2000 can also handle audit histories and provides a means to ensure new information is distributed. The product has 30 production sites worldwide.

  6. Critical incidents in nursing academics: discovering a new identity.

    PubMed

    Aguayo-González, Mariela; Castelló-Badía, Montserrat; Monereo-Font, Carles

    2015-01-01

    a qualitative study that followed the principles of the grounded theory in order to analyze the professional identity of nursing academics through the analysis of the most disturbing critical incidents. semi-structured interviews were conducted with seven nurses who worked as professors and researchers in a private university in Barcelona. the resulting empirical material was organized into two categories: characterization of critical incidents and responsiveness to the incident. the professional identity of nurses regarding the academic area is still under construction and inexperience is the major obstacle in the management of critical incidents in the teaching career.

  7. The Identity Mapping Project: Demographic differences in patterns of distributed identity.

    PubMed

    Gilbert, Richard L; Dionisio, John David N; Forney, Andrew; Dorin, Philip

    2015-01-01

    The advent of cloud computing and a multi-platform digital environment is giving rise to a new phase of human identity called "The Distributed Self." In this conception, aspects of the self are distributed into a variety of 2D and 3D digital personas with the capacity to reflect any number of combinations of now malleable personality traits. In this way, the source of human identity remains internal and embodied, but the expression or enactment of the self becomes increasingly external, disembodied, and distributed on demand. The Identity Mapping Project (IMP) is an interdisciplinary collaboration between psychology and computer Science designed to empirically investigate the development of distributed forms of identity. Methodologically, it collects a large database of "identity maps" - computerized graphical representations of how active someone is online and how their identity is expressed and distributed across 7 core digital domains: email, blogs/personal websites, social networks, online forums, online dating sites, character based digital games, and virtual worlds. The current paper reports on gender and age differences in online identity based on an initial database of distributed identity profiles.

  8. Data systems can boost nursing care. Nurse management information systems in resource management.

    PubMed

    Wilson, J

    1992-02-01

    Resource management aims to improve patient care by matching resources with patient needs. Nurse management information systems provide data on skill mix, rostering requirements, ward costs and patient dependency levels, enabling a nursing strategy to be planned for the ward.

  9. 23 CFR 971.204 - Management systems requirements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL LANDS HIGHWAYS FOREST SERVICE... maintain the management systems and their associated databases; and (5) A process for data collection, processing, analysis, and updating for each management system. (c) All management systems will use databases...

  10. Neurodegeneration and Identity.

    PubMed

    Strohminger, Nina; Nichols, Shaun

    2015-09-01

    There is a widespread notion, both within the sciences and among the general public, that mental deterioration can rob individuals of their identity. Yet there have been no systematic investigations of what types of cognitive damage lead people to appear to no longer be themselves. We measured perceived identity change in patients with three kinds of neurodegenerative disease: frontotemporal dementia, Alzheimer's disease, and amyotrophic lateral sclerosis. Structural equation models revealed that injury to the moral faculty plays the primary role in identity discontinuity. Other cognitive deficits, including amnesia, have no measurable impact on identity persistence. Accordingly, frontotemporal dementia has the greatest effect on perceived identity, and amyotrophic lateral sclerosis has the least. We further demonstrated that perceived identity change fully mediates the impact of neurodegenerative disease on relationship deterioration between patient and caregiver. Our results mark a departure from theories that ground personal identity in memory, distinctiveness, dispositional emotion, or global mental function. © The Author(s) 2015.

  11. Multi-faceted identities and interactions in mixed health teams.

    PubMed

    Arieli, Daniella; Hirschfeld, Miriam J

    2016-01-01

    The literature in the area of the health workforce and societies in conflict encompasses a wide range of studies and potential directions. Lately, Keshet and Popper-Giveon reported on a study based on interviews with 13 Arab Israeli nurses who work in Israeli hospitals. This preliminary study describes how being an Arab nurse in Israel is experienced and perceived by those nurses. The results indicate the need for further studies on the complexity of health workers' experiences in their changing and multi-faceted professional, cultural, gender and national identities. In order to manage health systems, in particular in divided societies that are characterized by inter-group conflicts, special attention should be given to studying the everyday processes in mixed teams.

  12. Mapping the Identity of a Viewed Hand in the Motor System: Evidence from Stimulus-Response Compatibility

    ERIC Educational Resources Information Center

    Vainio, Lari; Mustonen, Terhi

    2011-01-01

    Brain-imaging research has shown that a viewed acting hand is mapped to the observer's hand representation that corresponds with the identity of the hand. In contrast, behavioral research has suggested that rather than representing a seen hand in relation to one's own manual system, it is represented in relation to the midline of an imaginary…

  13. Master's Degree in Management Information Systems with a Supply Chain Management Focus

    ERIC Educational Resources Information Center

    Ramaswamy, Kizhanatham V.; Boyd, Joseph L.; Desai, Mayur

    2007-01-01

    A graduate curriculum in Management Information Systems with a Supply Chain Management focus is presented. The motivation for this endeavor stems from the fact that the global scope of modern business organizations and the competitive environment in which they operate, requires an information system leveraged supply chain management system (SCM)…

  14. 48 CFR 2452.242-71 - Contract management system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Contract management system... 2452.242-71 Contract management system. As prescribed in 2442.1107, insert the following clause: Contract Management System (FEB 2006) (a) The contractor shall use contract management baseline planning...

  15. Sex-Role Influences on Turkish Adolescents' Self-Identity.

    ERIC Educational Resources Information Center

    Yildirim, Ali

    This study was undertaken to investigate sex role influences on Turkish adolescents' self-identity process as part of an international self-identity research project. Specifically, the purpose of this study was to examine the role gender plays in the value systems of Turkish adolescents through a questionnaire. A total of 154 male and 119 female…

  16. 20 CFR 633.311 - Management information systems.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Management information systems. 633.311... AND SEASONAL FARMWORKER PROGRAMS Program Design and Administrative Procedures § 633.311 Management information systems. All grantees shall establish and maintain a program and financial management system which...

  17. 20 CFR 632.32 - Financial management systems.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Financial management systems. 632.32 Section... Financial management systems. (a) Each Native American grantee, subgrantee and contractor shall maintain a financial management system which will provide accurate, current and complete disclosure of the financial...

  18. 20 CFR 632.32 - Financial management systems.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 3 2011-04-01 2011-04-01 false Financial management systems. 632.32 Section... Financial management systems. (a) Each Native American grantee, subgrantee and contractor shall maintain a financial management system which will provide accurate, current and complete disclosure of the financial...

  19. 20 CFR 633.311 - Management information systems.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 3 2011-04-01 2011-04-01 false Management information systems. 633.311... AND SEASONAL FARMWORKER PROGRAMS Program Design and Administrative Procedures § 633.311 Management information systems. All grantees shall establish and maintain a program and financial management system which...

  20. 20 CFR 633.311 - Management information systems.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 3 2012-04-01 2012-04-01 false Management information systems. 633.311... AND SEASONAL FARMWORKER PROGRAMS Program Design and Administrative Procedures § 633.311 Management information systems. All grantees shall establish and maintain a program and financial management system which...

  1. NASA's Risk Management System

    NASA Technical Reports Server (NTRS)

    Perera, Jeevan S.

    2011-01-01

    Leadership is key to success. Phased-approach for implementation of risk management is necessary. Risk management system will be simple, accessible and promote communication of information to all relevant stakeholders for optimal resource allocation and risk mitigation. Risk management should be used by all team members to manage risks -- risk office personnel. Each group is assigned Risk Integrators who are facilitators for effective risk management. Risks will be managed at the lowest-level feasible, elevate only those risks that require coordination or management from above. Risk reporting and communication is an essential element of risk management and will combine both qualitative and quantitative elements. Risk informed decision making should be introduced to all levels of management. Provide necessary checks and balances to insure that risks are caught/identified and dealt with in a timely manner. Many supporting tools, processes & training must be deployed for effective risk management implementation. Process improvement must be included in the risk processes.

  2. Does Everyone Have a Musical Identity?: Reflections on "Musical Identities"

    ERIC Educational Resources Information Center

    Gracyk, Theodore

    2004-01-01

    The book, "Musical Identities" (Raymond MacDonald, David Hargreaves, Dorothy Miell, eds.; Oxford and New York: Oxford University Press, 2002) consists of 11 essays on the psychology of music. The editors divided the essays into two groups: those on developing musical identities ("identities in music" involving recognizable…

  3. Korean Adoptee Identity: Adoptive and Ethnic Identity Profiles of Adopted Korean Americans.

    PubMed

    Beaupre, Adam J; Reichwald, Reed; Zhou, Xiang; Raleigh, Elizabeth; Lee, Richard M

    2015-12-01

    Adopted Korean adolescents face the task of grappling with their identity as Koreans and coming to terms with their adoptive status. In order to explore these dual identities, the authors conducted a person-centered study of the identity profiles of 189 adopted Korean American adolescents. Using cluster analytic procedures, the study examined patterns of commitment to ethnic and adoptive identities, revealing six conceptually unique identity clusters. Analyzing the association between these identity profiles and psychological adjustment, the study found that the identity profiles were undifferentiated with respect to behavioral development and risk behaviors. However, group differences were found on life satisfaction, school adjustment, and family functioning. Results confirm the importance of considering the collective impact of multiple social identities on a variety of outcomes. The social implications of the results are discussed. © 2015 Wiley Periodicals, Inc.

  4. Perspectives on Sexual Identity Formation, Identity Practices, and Identity Transitions Among Men Who Have Sex With Men in India.

    PubMed

    Tomori, Cecilia; Srikrishnan, Aylur K; Ridgeway, Kathleen; Solomon, Sunil S; Mehta, Shruti H; Solomon, Suniti; Celentano, David D

    2018-01-01

    Men who have sex with men (MSM) remain at high risk for HIV infection. Culturally specific sexual identities, encompassing sexual roles, behavior, and appearance, may shape MSM's experiences of stigmatization and discrimination, and affect their vulnerability to HIV. This multi-site qualitative study (n = 363) encompassing 31 focus group discussions (FGDs) and 121 in-depth interviews (IDIs) across 15 sites in India investigated sexual identity formation, identity practices, and transitions and their implications for HIV prevention. IDIs and FGDs were transcribed, translated, and underwent thematic analysis. Our findings document heterogeneous sexual identity formation, with MSM who have more gender nonconforming behaviors or appearance reporting greater family- and community-level disapproval, harassment, violence, and exclusion. Concealing feminine aspects of sexual identities was important in daily life, especially for married MSM. Some participants negotiated their identity practices in accordance with socioeconomic and cultural pressures, including taking on identity characteristics to suit consumer demand in sex work and on extended periods of joining communities of hijras (sometimes called TG or transgender women). Participants also reported that some MSM transition toward more feminine and hijra or transgender women identities, motivated by intersecting desires for feminine gender expression and by social exclusion and economic marginalization. Future studies should collect information on gender nonconformity stigma, and any changes in sexual identity practices or plans for transitions to other identities over time, in relation to HIV risk behaviors and outcomes.

  5. Perceptions of Turkish dentists of their professional identity in a market-orientated system.

    PubMed

    Ocek, Zeliha Asli; Vatansever, Kevser

    2014-01-01

    This study explores the perceptions of Turkish dentists of their professional identity and of the effects of market orientation in dentistry. This phenomenological study used a qualitative approach using a group of Turkish dentists, who were selected based on the principle of maximum variation. Four focus groups and 31 in-depth interviews were conducted. Forty-nine dentists were interviewed using a semi-structured form. The data analysis yielded three themes: (a) dentistry as a business; (b) dentistry as a profession; and (c) professional status of dentistry in the health care system and in the community. The participants' statements reflected that the dominance of market mechanisms in dentistry inevitably forces dentists to adopt the characteristics of a business person and prevents them from fulfilling the basic requirements of professionalism. All participants explained that with the transformation of the dental care market, dentists have become a cheap labor force and have lost their professional autonomy. Our study has confirmed previous reports pointing out the conflict between dentistry as a profession and dentistry as a commercial operation. The study also showed that in Turkey, as a country experiencing rapid reform processes, dentists' control over their professional practices and identities has decreased.

  6. Design distributed simulation platform for vehicle management system

    NASA Astrophysics Data System (ADS)

    Wen, Zhaodong; Wang, Zhanlin; Qiu, Lihua

    2006-11-01

    Next generation military aircraft requires the airborne management system high performance. General modules, data integration, high speed data bus and so on are needed to share and manage information of the subsystems efficiently. The subsystems include flight control system, propulsion system, hydraulic power system, environmental control system, fuel management system, electrical power system and so on. The unattached or mixed architecture is changed to integrated architecture. That means the whole airborne system is regarded into one system to manage. So the physical devices are distributed but the system information is integrated and shared. The process function of each subsystem are integrated (including general process modules, dynamic reconfiguration), furthermore, the sensors and the signal processing functions are shared. On the other hand, it is a foundation for power shared. Establish a distributed vehicle management system using 1553B bus and distributed processors which can provide a validation platform for the research of airborne system integrated management. This paper establishes the Vehicle Management System (VMS) simulation platform. Discuss the software and hardware configuration and analyze the communication and fault-tolerant method.

  7. The Family as a Site for Gendered Ethnic Identity Work among Asian Indian Immigrants

    ERIC Educational Resources Information Center

    Mehrotra, Meeta; Calasanti, Toni M.

    2010-01-01

    Research on immigrants often points to the family as a source of support and a location for oppression. Using in-depth interviews with 38 first-generation immigrant Indians, this study adds to this literature by exploring families as sites of identity work where first-generation immigrants manage their gendered ethnic identities. Relocation into a…

  8. 7 CFR 246.13 - Financial management system.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 4 2010-01-01 2010-01-01 false Financial management system. 246.13 Section 246.13... State Agency Provisions § 246.13 Financial management system. (a) Disclosure of expenditures. The State agency shall maintain a financial management system which provides accurate, current and complete...

  9. 14 CFR 152.303 - Financial management system.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Financial management system. 152.303... (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Accounting and Reporting Requirements § 152.303 Financial management system. Each sponsor or planning agency shall establish and maintain a financial management system that...

  10. 14 CFR 152.303 - Financial management system.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Financial management system. 152.303... (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Accounting and Reporting Requirements § 152.303 Financial management system. Each sponsor or planning agency shall establish and maintain a financial management system that...

  11. 7 CFR 246.13 - Financial management system.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 4 2014-01-01 2014-01-01 false Financial management system. 246.13 Section 246.13... State Agency Provisions § 246.13 Financial management system. (a) Disclosure of expenditures. The State agency shall maintain a financial management system which provides accurate, current and complete...

  12. 7 CFR 246.13 - Financial management system.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 4 2013-01-01 2013-01-01 false Financial management system. 246.13 Section 246.13... State Agency Provisions § 246.13 Financial management system. (a) Disclosure of expenditures. The State agency shall maintain a financial management system which provides accurate, current and complete...

  13. 7 CFR 246.13 - Financial management system.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 4 2012-01-01 2012-01-01 false Financial management system. 246.13 Section 246.13... State Agency Provisions § 246.13 Financial management system. (a) Disclosure of expenditures. The State agency shall maintain a financial management system which provides accurate, current and complete...

  14. A longitudinal integration of identity styles and educational identity processes in adolescence.

    PubMed

    Negru-Subtirica, Oana; Pop, Eleonora Ioana; Crocetti, Elisabetta

    2017-11-01

    Identity formation is a main adolescent psychosocial developmental task. The complex interconnection between different processes that are at the basis of one's identity is a research and applied intervention priority. In this context, the identity style model focuses on social-cognitive strategies (i.e., informational, normative, and diffuse-avoidant) that individuals can use to deal with identity formation. The 3-factor identity dimensional model examines the interplay between identity processes of commitment, in-depth exploration, and reconsideration of commitment in different life domains. Theoretical integrations between these models have been proposed, but there is a dearth of studies unraveling their longitudinal links in specific identity domains. We addressed this gap by testing in a 3-wave longitudinal study the bidirectional associations between identity styles and educational identity processes measured during 1 academic year. Participants were 1,151 adolescents (58.7% female). Results highlighted that the informational style was related over time to higher levels of educational commitment and in-depth exploration, whereas the diffuse-avoidant style was related to lower levels of commitment and higher levels of reconsideration of commitment. Educational commitment was positively related to the informational and normative styles; in-depth exploration was positively related to the informational style; and reconsideration of commitment was positively related to the diffuse-avoidant style. These relations were not moderated by adolescents' gender and age. Hence, identity styles and educational identity processes reinforce each other during 1 academic year. Theoretical integrations between these models, suggestions for integration with other identity approaches (e.g., narrative identity models), and practical implications are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  15. Information Requirements for a Procurement Management Information System.

    DTIC Science & Technology

    1975-08-01

    Management Information System is...described and some justification for this type of procurement management information system is presented. A literature search was made to determine...information systems. If information requirements are correctly identified and satisfied by a procurement management information system , contract administration and procurement management can be

  16. Transmit: An Advanced Traffic Management System

    DOT National Transportation Integrated Search

    1995-11-27

    TRANSCOM'S SYSTEM FOR MANAGING INCIDENTS AND TRAFFIC, KNOWN AS TRANSMIT, WAS INITIATED TO ESTABLISH THE FEASIBILITY OF USING AUTOMATIC VEHICLE IDENTIFICATION (AVI) EQUIPMENT FOR TRAFFIC MANAGEMENT AND SURVEILLANCE APPLICATIONS. AVI TECHNOLOGY SYSTEMS...

  17. Multiple system modelling of waste management

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eriksson, Ola, E-mail: ola.eriksson@hig.se; Department of Building, Energy and Environmental Engineering, University of Gaevle, SE 801 76 Gaevle; Bisaillon, Mattias, E-mail: mattias.bisaillon@profu.se

    2011-12-15

    Highlights: > Linking of models will provide a more complete, correct and credible picture of the systems. > The linking procedure is easy to perform and also leads to activation of project partners. > The simulation procedure is a bit more complicated and calls for the ability to run both models. - Abstract: Due to increased environmental awareness, planning and performance of waste management has become more and more complex. Therefore waste management has early been subject to different types of modelling. Another field with long experience of modelling and systems perspective is energy systems. The two modelling traditions havemore » developed side by side, but so far there are very few attempts to combine them. Waste management systems can be linked together with energy systems through incineration plants. The models for waste management can be modelled on a quite detailed level whereas surrounding systems are modelled in a more simplistic way. This is a problem, as previous studies have shown that assumptions on the surrounding system often tend to be important for the conclusions. In this paper it is shown how two models, one for the district heating system (MARTES) and another one for the waste management system (ORWARE), can be linked together. The strengths and weaknesses with model linking are discussed when compared to simplistic assumptions on effects in the energy and waste management systems. It is concluded that the linking of models will provide a more complete, correct and credible picture of the consequences of different simultaneous changes in the systems. The linking procedure is easy to perform and also leads to activation of project partners. However, the simulation procedure is a bit more complicated and calls for the ability to run both models.« less

  18. Service Discovery Oriented Management System Construction Method

    NASA Astrophysics Data System (ADS)

    Li, Huawei; Ren, Ying

    2017-10-01

    In order to solve the problem that there is no uniform method for design service quality management system in large-scale complex service environment, this paper proposes a distributed service-oriented discovery management system construction method. Three measurement functions are proposed to compute nearest neighbor user similarity at different levels. At present in view of the low efficiency of service quality management systems, three solutions are proposed to improve the efficiency of the system. Finally, the key technologies of distributed service quality management system based on service discovery are summarized through the factor addition and subtraction of quantitative experiment.

  19. Automated Traffic Management System and Method

    NASA Technical Reports Server (NTRS)

    Glass, Brian J. (Inventor); Spirkovska, Liljana (Inventor); McDermott, William J. (Inventor); Reisman, Ronald J. (Inventor); Gibson, James (Inventor); Iverson, David L. (Inventor)

    2000-01-01

    A data management system and method that enables acquisition, integration, and management of real-time data generated at different rates, by multiple heterogeneous incompatible data sources. The system achieves this functionality by using an expert system to fuse data from a variety of airline, airport operations, ramp control, and air traffic control tower sources, to establish and update reference data values for every aircraft surface operation. The system may be configured as a real-time airport surface traffic management system (TMS) that electronically interconnects air traffic control, airline data, and airport operations data to facilitate information sharing and improve taxi queuing. In the TMS operational mode, empirical data shows substantial benefits in ramp operations for airlines, reducing departure taxi times by about one minute per aircraft in operational use, translating as $12 to $15 million per year savings to airlines at the Atlanta, Georgia airport. The data management system and method may also be used for scheduling the movement of multiple vehicles in other applications, such as marine vessels in harbors and ports, trucks or railroad cars in ports or shipping yards, and railroad cars in switching yards. Finally, the data management system and method may be used for managing containers at a shipping dock, stock on a factory floor or in a warehouse, or as a training tool for improving situational awareness of FAA tower controllers, ramp and airport operators, or commercial airline personnel in airfield surface operations.

  20. Dual-Use Aspects of System Health Management

    NASA Technical Reports Server (NTRS)

    Owens, P. R.; Jambor, B. J.; Eger, G. W.; Clark, W. A.

    1994-01-01

    System Health Management functionality is an essential part of any space launch system. Health management functionality is an integral part of mission reliability, since it is needed to verify the reliability before the mission starts. Health Management is also a key factor in life cycle cost reduction and in increasing system availability. The degree of coverage needed by the system and the degree of coverage made available at a reasonable cost are critical parameters of a successful design. These problems are not unique to the launch vehicle world. In particular, the Intelligent Vehicle Highway System, commercial aircraft systems, train systems, and many types of industrial production facilities require various degrees of system health management. In all of these applications, too, the designers must balance the benefits and costs of health management in order to optimize costs. The importance of an integrated system is emphasized. That is, we present the case for considering health management as an integral part of system design, rather than functionality to be added on at the end of the design process. The importance of maintaining the system viewpoint is discussed in making hardware and software tradeoffs and in arriving at design decisions. We describe an approach to determine the parameters to be monitored in any system health management application. This approach is based on Design of Experiments (DOE), prototyping, failure modes and effects analyses, cost modeling and discrete event simulation. The various computer-based tools that facilitate the approach are discussed. The approach described originally was used to develop a fault tolerant avionics architecture for launch vehicles that incorporated health management as an integral part of the system. Finally, we discuss generalizing the technique to apply it to other domains. Several illustrations are presented.

  1. DKIST facility management system integration

    NASA Astrophysics Data System (ADS)

    White, Charles R.; Phelps, LeEllen

    2016-07-01

    The Daniel K. Inouye Solar Telescope (DKIST) Observatory is under construction at Haleakalā, Maui, Hawai'i. When complete, the DKIST will be the largest solar telescope in the world. The Facility Management System (FMS) is a subsystem of the high-level Facility Control System (FCS) and directly controls the Facility Thermal System (FTS). The FMS receives operational mode information from the FCS while making process data available to the FCS and includes hardware and software to integrate and control all aspects of the FTS including the Carousel Cooling System, the Telescope Chamber Environmental Control Systems, and the Temperature Monitoring System. In addition it will integrate the Power Energy Management System and several service systems such as heating, ventilation, and air conditioning (HVAC), the Domestic Water Distribution System, and the Vacuum System. All of these subsystems must operate in coordination to provide the best possible observing conditions and overall building management. Further, the FMS must actively react to varying weather conditions and observational requirements. The physical impact of the facility must not interfere with neighboring installations while operating in a very environmentally and culturally sensitive area. The FMS system will be comprised of five Programmable Automation Controllers (PACs). We present a pre-build overview of the functional plan to integrate all of the FMS subsystems.

  2. Integrating modal-based NDE techniques and bridge management systems using quality management

    NASA Astrophysics Data System (ADS)

    Sikorsky, Charles S.

    1997-05-01

    The intent of bridge management systems is to help engineers and managers determine when and where to spend bridge funds such that commerce and the motoring public needs are satisfied. A major shortcoming which states are experiencing is the NBIS data available is insufficient to perform certain functions required by new bridge management systems, such as modeling bridge deterioration and predicting costs. This paper will investigate how modal based nondestructive damage evaluation techniques can be integrated into bridge management using quality management principles. First, quality from the manufacturing perspective will be summarized. Next, the implementation of quality management in design and construction will be reinterpreted for bridge management. Based on this, a theory of approach will be formulated to improve the productivity of a highway transportation system.

  3. Autonomously managed electrical power systems

    NASA Technical Reports Server (NTRS)

    Callis, Charles P.

    1986-01-01

    The electric power systems for future spacecraft such as the Space Station will necessarily be more sophisticated and will exhibit more nearly autonomous operation than earlier spacecraft. These new power systems will be more reliable and flexible than their predecessors offering greater utility to the users. Automation approaches implemented on various power system breadboards are investigated. These breadboards include the Hubble Space Telescope power system test bed, the Common Module Power Management and Distribution system breadboard, the Autonomusly Managed Power System (AMPS) breadboard, and the 20 kilohertz power system breadboard. Particular attention is given to the AMPS breadboard. Future plans for these breadboards including the employment of artificial intelligence techniques are addressed.

  4. [Applications of the hospital statistics management system].

    PubMed

    Zhai, Hong; Ren, Yong; Liu, Jing; Li, You-Zhang; Ma, Xiao-Long; Jiao, Tao-Tao

    2008-01-01

    The Hospital Statistics Management System is built on an Office Automation Platform of Shandong provincial hospital system. Its workflow, role and popedom technologies are used to standardize and optimize the management program of statistics in the total quality control of hospital statistics. The system's applications have combined the office automation platform with the statistics management in a hospital and this provides a practical example of a modern hospital statistics management model.

  5. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    ERIC Educational Resources Information Center

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  6. African American Identity and a Theory for Primary Cultural Instructional Design

    ERIC Educational Resources Information Center

    Thomas, Michael K.; Columbus, Marco A.

    2010-01-01

    This article is on the strange confluence of culture, identity, learning, and systemic design. We argue that the work of instructional design is, essentially, work on culture and identity. A person's culture and identity fully and inextricably situate their thought, action, and interaction. For this reason, this inherent situatedness of culture…

  7. Distribution Management System Volt/VAR Evaluation | Grid Modernization |

    Science.gov Websites

    NREL Distribution Management System Volt/VAR Evaluation Distribution Management System Volt/VAR Evaluation This project involves building a prototype distribution management system testbed that links a GE Grid Solutions distribution management system to power hardware-in-the-loop testing. This setup is

  8. Silvicultural systems for managing ponderosa pine

    Treesearch

    Andrew Youngblood

    2005-01-01

    Silviculturists have primarily relied on classical even-aged silvicultural systems (the planned series of treatments for tending, harvesting, and re-establishing a stand) for ponderosa pine, with uneven-aged systems used to a lesser degree. Current management practices involve greater innovation because of conflicting management objectives. Silvicultural systems used...

  9. Political, religious and occupational identities in context: placing identity status paradigm in context.

    PubMed

    Solomontos-Kountouri, Olga; Hurry, Jane

    2008-04-01

    This study critically contrasts global identity with domain-specific identities (political, religious and occupational) and considers context and gender as integral parts of identity. In a cross-sectional survey, 1038 Greek Cypriot adolescents (449 boys and 589 girls, mean age 16.8) from the three different types of secondary schools (state, state technical and private) and from different SES completed part of the Extended Objective Measure of Ego Identity Status-2 (EOMEIS-2). The macro-context of Greek Cypriot society is used to understand the role of context in adolescents' identities. Results showed that Greek Cypriot young people were not in the same statuses across their global, political, religious and occupational identities. This heterogeneity in the status of global identity and of each identity domain is partially explained by differences in gender, type of school and SES (socio-economic status). The fact that identity status is found to be reactive to context suggests that developmental stage models of identity status should place greater emphasis on context.

  10. Hospital managers need management information systems.

    PubMed

    Davis, S; Freeman, J R

    1976-01-01

    A new hospital director seeking to bring his institution to the brink of solvency found himself with ten pounds of data but no "information"--at least, not the kind of information he could use as a basis for management decisions. What he needed was a system that would not only present data, but the meaning of the data. Such a system is the integrated MIS.

  11. Integrated Procurement Management System, Version II

    NASA Technical Reports Server (NTRS)

    Collier, L. J.

    1985-01-01

    Integrated Procurement Management System, Version II (IPMS II) is online/ batch system for collecting developing, managing and disseminating procurementrelated data at NASA Johnson Space Center. Portions of IPMS II adaptable to other procurement situations.

  12. Development of a change management system

    NASA Technical Reports Server (NTRS)

    Parks, Cathy Bonifas

    1993-01-01

    The complexity and interdependence of software on a computer system can create a situation where a solution to one problem causes failures in dependent software. In the computer industry, software problems arise and are often solved with 'quick and dirty' solutions. But in implementing these solutions, documentation about the solution or user notification of changes is often overlooked, and new problems are frequently introduced because of insufficient review or testing. These problems increase when numerous heterogeneous systems are involved. Because of this situation, a change management system plays an integral part in the maintenance of any multisystem computing environment. At the NASA Ames Advanced Computational Facility (ACF), the Online Change Management System (OCMS) was designed and developed to manage the changes being applied to its multivendor computing environment. This paper documents the research, design, and modifications that went into the development of this change management system (CMS).

  13. The MNESIS model: Memory systems and processes, identity and future thinking.

    PubMed

    Eustache, Francis; Viard, Armelle; Desgranges, Béatrice

    2016-07-01

    The Memory NEo-Structural Inter-Systemic model (MNESIS; Eustache and Desgranges, Neuropsychology Review, 2008) is a macromodel based on neuropsychological data which presents an interactive construction of memory systems and processes. Largely inspired by Tulving's SPI model, MNESIS puts the emphasis on the existence of different memory systems in humans and their reciprocal relations, adding new aspects, such as the episodic buffer proposed by Baddeley. The more integrative comprehension of brain dynamics offered by neuroimaging has contributed to rethinking the existence of memory systems. In the present article, we will argue that understanding the concept of memory by dividing it into systems at the functional level is still valid, but needs to be considered in the light of brain imaging. Here, we reinstate the importance of this division in different memory systems and illustrate, with neuroimaging findings, the links that operate between memory systems in response to task demands that constrain the brain dynamics. During a cognitive task, these memory systems interact transiently to rapidly assemble representations and mobilize functions to propose a flexible and adaptative response. We will concentrate on two memory systems, episodic and semantic memory, and their links with autobiographical memory. More precisely, we will focus on interactions between episodic and semantic memory systems in support of 1) self-identity in healthy aging and in brain pathologies and 2) the concept of the prospective brain during future projection. In conclusion, this MNESIS global framework may help to get a general representation of human memory and its brain implementation with its specific components which are in constant interaction during cognitive processes. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. 12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM FAIR CREDIT REPORTING (REGULATION V) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope...

  15. 12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM FAIR CREDIT REPORTING (REGULATION V) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope...

  16. A rural transit asset management system

    DOT National Transportation Integrated Search

    2005-01-01

    This reports the research undertaken to create an interactive, geographic information system based asset management system for the Alabama Department of Transportation to manage vehicles purchased and operated through Section 5310 and 5311 federal gr...

  17. Management Development in the NHS: Nurses and Managers, Discourses and Identities

    ERIC Educational Resources Information Center

    Sambrook, Sally

    2006-01-01

    Purpose: Aims to provide a brief discussion of discourses of HRD, then a brief review of HRD within the NHS, including stakeholders in HRD, and particularly management development. To explore some of the different discourses used by different managers, particularly those with a nursing background and those without, and the possible reasons for the…

  18. Data Grid Management Systems

    NASA Technical Reports Server (NTRS)

    Moore, Reagan W.; Jagatheesan, Arun; Rajasekar, Arcot; Wan, Michael; Schroeder, Wayne

    2004-01-01

    The "Grid" is an emerging infrastructure for coordinating access across autonomous organizations to distributed, heterogeneous computation and data resources. Data grids are being built around the world as the next generation data handling systems for sharing, publishing, and preserving data residing on storage systems located in multiple administrative domains. A data grid provides logical namespaces for users, digital entities and storage resources to create persistent identifiers for controlling access, enabling discovery, and managing wide area latencies. This paper introduces data grids and describes data grid use cases. The relevance of data grids to digital libraries and persistent archives is demonstrated, and research issues in data grids and grid dataflow management systems are discussed.

  19. Identity and Intimacy during Adolescence: Connections among Identity Styles, Romantic Attachment and Identity Commitment

    ERIC Educational Resources Information Center

    Kerpelman, Jennifer L.; Pittman, Joe F.; Cadely, Hans Saint-Eloi; Tuggle, Felicia J.; Harrell-Levy, Marinda K.; Adler-Baeder, Francesca M.

    2012-01-01

    Integration of adult attachment and psychosocial development theories suggests that adolescence is a time when capacities for romantic intimacy and identity formation are co-evolving. The current study addressed direct, indirect and moderated associations among identity and romantic attachment constructs with a diverse sample of 2178 middle…

  20. X-33/RLV System Health Management/Vehicle Health Management

    NASA Technical Reports Server (NTRS)

    Mouyos, William; Wangu, Srimal

    1998-01-01

    To reduce operations costs, Reusable Launch Vehicles (RLVS) must include highly reliable robust subsystems which are designed for simple repair access with a simplified servicing infrastructure, and which incorporate expedited decision-making about faults and anomalies. A key component for the Single Stage To Orbit (SSTO) RLV system used to meet these objectives is System Health Management (SHM). SHM incorporates Vehicle Health Management (VHM), ground processing associated with the vehicle fleet (GVHM), and Ground Infrastructure Health Management (GIHM). The primary objective of SHM is to provide an automated and paperless health decision, maintenance, and logistics system. Sanders, a Lockheed Martin Company, is leading the design, development, and integration of the SHM system for RLV and for X-33 (a sub-scale, sub-orbit Advanced Technology Demonstrator). Many critical technologies are necessary to make SHM (and more specifically VHM) practical, reliable, and cost effective. This paper will present the X-33 SHM design which forms the baseline for the RLV SHM, and it will discuss applications of advanced technologies to future RLVs. In addition, this paper will describe a Virtual Design Environment (VDE) which is being developed for RLV. This VDE will allow for system design engineering, as well as program management teams, to accurately and efficiently evaluate system designs, analyze the behavior of current systems, and predict the feasibility of making smooth and cost-efficient transitions from older technologies to newer ones. The RLV SHM design methodology will reduce program costs, decrease total program life-cycle time, and ultimately increase mission success.

  1. Automated distribution system management for multichannel space power systems

    NASA Technical Reports Server (NTRS)

    Fleck, G. W.; Decker, D. K.; Graves, J.

    1983-01-01

    A NASA sponsored study of space power distribution system technology is in progress to develop an autonomously managed power system (AMPS) for large space power platforms. The multichannel, multikilowatt, utility-type power subsystem proposed presents new survivability requirements and increased subsystem complexity. The computer controls under development for the power management system must optimize the power subsystem performance and minimize the life cycle cost of the platform. A distribution system management philosophy has been formulated which incorporates these constraints. Its implementation using a TI9900 microprocessor and FORTH as the programming language is presented. The approach offers a novel solution to the perplexing problem of determining the optimal combination of loads which should be connected to each power channel for a versatile electrical distribution concept.

  2. Stories and metaphors in the sensemaking of multiple primary health care organizational identities

    PubMed Central

    2014-01-01

    Background The Quebec primary health care delivery system has experienced numerous reforms over the last 15 years. In this study, we sought to examine how managers and primary care providers made sense of the creation of successive new primary care organizational forms. Methods We conducted a longitudinal qualitative case study in a primary care practice group located in Montreal, Quebec, for over 6 years (2002 to 2008). The data sources for the study include 31 semi-structured interviews with key informants, in-situ observations of group meetings, as well as documents and field notes. Textual material was submitted to narrative and metaphor analysis. Results The core metaphor of the journey came from a set of stories in which the members of this primary care group depicted the processes undertaken towards developing a multidisciplinary cooperative practice, which include an uneasy departure, uncertainty about the destination, conflict among members who jump ship or stay on board, negotiations about the itinerary, and, finally, enduring challenges in leading the way and being pioneers of change in the organization of primary care in their institutional context. Identification with the initial family medicine unit identity was persistent over time, but successive reforms further enriched its meaning as it became a multidisciplinary primary care practice pioneering organizational change. Conclusions In order to support primary care reforms in complex institutional fields, this study proposes that decision-makers undertake a journey in which they recognize both the need to capitalize on existing meaningful and legitimated organizational identities, as well as the necessity for collective leadership in the management of multiple organizational identities over time. PMID:24588933

  3. Manpower management information system /MIS/

    NASA Technical Reports Server (NTRS)

    Gravette, M. C.; King, W. L.

    1971-01-01

    System of programs capable of building and maintaining data bank provides all levels of management with regular manpower evaluation reports and data source for special management exercises on manpower.

  4. X-33/RLV System Health Management/ Vehicle Health Management

    NASA Technical Reports Server (NTRS)

    Garbos, Raymond J.; Mouyos, William

    1998-01-01

    To reduce operations cost, the RLV must include the following elements: highly reliable, robust subsystems designed for simple repair access with a simplified servicing infrastructure and incorporating expedited decision making about faults and anomalies. A key component for the Single Stage to Orbit (SSTO) RLV System used to meet these objectives is System Health Management (SHM). SHM deals with the vehicle component- Vehicle Health Management (VHM), the ground processing associated with the fleet (GVHM) and the Ground Infrastructure Health Management (GIHM). The objective is to provide an automated collection and paperless health decision, maintenance and logistics system. Many critical technologies are necessary to make the SHM (and more specifically VHM) practical, reliable and cost effective. Sanders is leading the design, development and integration of the SHM system for RLV and X-33 SHM (a sub-scale, sub-orbit Advanced Technology Demonstrator). This paper will present the X-33 SHM design which forms the baseline for RLV SHM. This paper will also discuss other applications of these technologies.

  5. 76 FR 76917 - Homeless Management Information Systems Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-09

    ...-P-01] Homeless Management Information Systems Requirements AGENCY: Office of the Assistant Secretary... for the establishment of regulations for Homeless Management Information Systems (HMIS), which are the... community development, Homeless, Information technology system, Management system, Nonprofit organizations...

  6. Shades of American Identity: Implicit Relations between Ethnic and National Identities

    PubMed Central

    Devos, Thierry; Mohamed, Hafsa

    2015-01-01

    The issue of ethnic diversity and national identity in an immigrant nation such as the USA is a recurrent topic of debate. We review and integrate research examining the extent to which the American identity is implicitly granted or denied to members of different ethnic groups. Consistently, European Americans are implicitly conceived of as being more American than African, Asian, Latino, and even Native Americans. This implicit American = White effect emerges when explicit knowledge or perceptions point in the opposite direction. The propensity to deny the American identity to members of ethnic minorities is particularly pronounced when targets (individuals or groups) are construed through the lenses of ethnic identities. Implicit ethnic–national associations fluctuate as a function of perceivers’ ethnic identity and political orientation, but also contextual or situational factors. The tendency to equate being American with being White accounts for the strength of national identification (among European Americans) and behavioral responses including hiring recommendations and voting intentions. The robust propensity to deny the American identity to ethnic minority groups reflects an exclusionary national identity. PMID:27011765

  7. Identity configurations: a new perspective on identity formation in contemporary society.

    PubMed

    Schachter, Elli P

    2004-02-01

    This paper deals with the theoretical construct of "identity configuration." It portrays the different possible ways in which individuals configure the relationship among potentially conflicting identifications in the process of identity formation. In order to explicate these configurations, I analyzed narratives of identity development retold by individuals describing personal identity conflicts that arise within a larger context of sociocultural conflict. Thirty Jewish modern orthodox young adults were interviewed regarding a potentially conflictual identity issue (i.e. their religious and sexual development). Their deliberations, as described in the interviews, were examined, and four different configurations were identified: a configuration based on choice and suppression; an assimilative and synthesizing configuration; a confederacy of identifications; and a configuration based on the thrill of dissonance. The different configurations are illustrated through exemplars, and the possible implications of the concept of "configuration" for identity theory are discussed.

  8. Use of electronic information systems in nursing management.

    PubMed

    Lammintakanen, Johanna; Saranto, Kaija; Kivinen, Tuula

    2010-05-01

    The purpose of this study is to describe nurse managers' perceptions of the use of electronic information systems in their daily work. Several kinds of software are used for administrative and information management purposes in health care organizations, but the issue has been studied less from nurse managers' perspective. The material for this qualitative study was acquired according to the principles of focus group interview. Altogether eight focus groups were held with 48 nurse managers from both primary and specialized health care organizations. The nurse managers were asked in focus groups to describe the use of information systems in their daily work in addition to some other themes. The material was analyzed by inductive content analysis using ATLAS.ti computer program. The main category "pros and cons of using information systems in nursing management" summarized the nurse managers' perceptions of using electronic information systems. The main category consisted of three sub-categories: (1) nurse managers' perceptions of the use of information technology; (2) usability of management information systems; (3) development of personnel competencies and work processes. The nurse managers made several comments on the implementation of immature electronic information systems which caused inefficiencies in working processes. However, they considered electronic information systems to be essential elements of their daily work. Furthermore, the nurse managers' descriptions of the pros and cons of using information systems reflected partly the shortcomings of strategic management and lack of coordination in health care organizations. Copyright 2010 Elsevier Ireland Ltd. All rights reserved.

  9. [The future of clinical laboratory database management system].

    PubMed

    Kambe, M; Imidy, D; Matsubara, A; Sugimoto, Y

    1999-09-01

    To assess the present status of the clinical laboratory database management system, the difference between the Clinical Laboratory Information System and Clinical Laboratory System was explained in this study. Although three kinds of database management systems (DBMS) were shown including the relational model, tree model and network model, the relational model was found to be the best DBMS for the clinical laboratory database based on our experience and developments of some clinical laboratory expert systems. As a future clinical laboratory database management system, the IC card system connected to an automatic chemical analyzer was proposed for personal health data management and a microscope/video system was proposed for dynamic data management of leukocytes or bacteria.

  10. 48 CFR 970.5232-7 - Financial management system.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Financial management... for Management and Operating Contracts 970.5232-7 Financial management system. As prescribed in 970.3270(b)(1), insert the following clause: Financial Management System (DEC 2000) The Contractor shall...

  11. 48 CFR 970.5232-7 - Financial management system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... maintain and administer a financial management system that is suitable to provide proper accounting in... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Financial management... for Management and Operating Contracts 970.5232-7 Financial management system. As prescribed in 970...

  12. 5 CFR 9701.405 - Performance management system requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... performance management systems for DHS employees, subject to the requirements set forth in this subpart. (b) Each DHS performance management system must— (1) Specify the employees covered by the system(s); (2... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Performance management system...

  13. 5 CFR 9701.405 - Performance management system requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... performance management systems for DHS employees, subject to the requirements set forth in this subpart. (b) Each DHS performance management system must— (1) Specify the employees covered by the system(s); (2... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Performance management system...

  14. 5 CFR 9701.405 - Performance management system requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... performance management systems for DHS employees, subject to the requirements set forth in this subpart. (b) Each DHS performance management system must— (1) Specify the employees covered by the system(s); (2... 5 Administrative Personnel 3 2012-01-01 2012-01-01 false Performance management system...

  15. 5 CFR 9701.405 - Performance management system requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... performance management systems for DHS employees, subject to the requirements set forth in this subpart. (b) Each DHS performance management system must— (1) Specify the employees covered by the system(s); (2... 5 Administrative Personnel 3 2014-01-01 2014-01-01 false Performance management system...

  16. Software Management System

    NASA Technical Reports Server (NTRS)

    1994-01-01

    A software management system, originally developed for Goddard Space Flight Center (GSFC) by Century Computing, Inc. has evolved from a menu and command oriented system to a state-of-the art user interface development system supporting high resolution graphics workstations. Transportable Applications Environment (TAE) was initially distributed through COSMIC and backed by a TAE support office at GSFC. In 1993, Century Computing assumed the support and distribution functions and began marketing TAE Plus, the system's latest version. The software is easy to use and does not require programming experience.

  17. Automated flight test management system

    NASA Technical Reports Server (NTRS)

    Hewett, M. D.; Tartt, D. M.; Agarwal, A.

    1991-01-01

    The Phase 1 development of an automated flight test management system (ATMS) as a component of a rapid prototyping flight research facility for artificial intelligence (AI) based flight concepts is discussed. The ATMS provides a flight engineer with a set of tools that assist in flight test planning, monitoring, and simulation. The system is also capable of controlling an aircraft during flight test by performing closed loop guidance functions, range management, and maneuver-quality monitoring. The ATMS is being used as a prototypical system to develop a flight research facility for AI based flight systems concepts at NASA Ames Dryden.

  18. "I'm Not an Immigrant!": Resistance, Redefinition, and the Role of Resources in Identity Work

    ERIC Educational Resources Information Center

    Killian, Caitlin; Johnson, Cathryn

    2006-01-01

    In this paper we examine the identity negotiation processes of North African immigrant women in France. Participants engaged in various forms of identity work, including selective association and management of appearance, as well as resisting others' attempts to categorize them as immigrants. Given that these women have chosen to move to France…

  19. Assessing biofiltration repeatability: statistical comparison of two identical toluene removal systems.

    PubMed

    Jiménez, Lucero; Arriaga, Sonia; Aizpuru, Aitor

    2016-01-01

    Biofiltration of volatile organic compounds is still considered an emerging technology. Its reliability remains questionable as no data is available regarding process intrinsic repeatability. Herein, two identically operated toluene biofiltration systems are comprehensively compared, during long-term operation (129 days). Globally, reactors responded very similarly, even during transient conditions, with, for example, strong biological activities from the first days of operation, and comparable periods of lower removal efficiency (81.2%) after exposure to high inlet loads (140 g m(-3) h(-1)). Regarding steady states, very similar maximum elimination capacities up to 99 g m(-3) h(-1) were attained. Estimation of the process repeatability, with the paired samples Student's t-test, indicated no statistically significant difference between elimination capacities. Repeatability was also established for several descriptors of the process such as the carbon dioxide and biomass production, the pH and organic content of the leachates, and the moisture content of the packing material. While some parameters, such as the pH, presented a remarkably low divergence between biofilters (coefficient of variability of 1.4%), others, such as the organic content of the leachates, presented higher variability (30.6%) due to an uneven biomass lixiviation associated with stochastic hydrodynamics and biomass repartitions. Regarding process efficiency, it was established that less than 10% of fluctuation is to be expected between the elimination capacities of identical biofilter set-ups. A further statistical comparison between the first halves of the biofilter columns indicated very similar coefficients of variability, confirming the repeatability of the process, for different biofilter lengths.

  20. Tank waste remediation system configuration management plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vann, J.M.

    The configuration management program for the Tank Waste Remediation System (TWRS) Project Mission supports management of the project baseline by providing the mechanisms to identify, document, and control the functional and physical characteristics of the products. This document is one of the tools used to develop and control the mission and work. It is an integrated approach for control of technical, cost, schedule, and administrative information necessary to manage the configurations for the TWRS Project Mission. Configuration management focuses on five principal activities: configuration management system management, configuration identification, configuration status accounting, change control, and configuration management assessments. TWRS Projectmore » personnel must execute work in a controlled fashion. Work must be performed by verbatim use of authorized and released technical information and documentation. Application of configuration management will be consistently applied across all TWRS Project activities and assessed accordingly. The Project Hanford Management Contract (PHMC) configuration management requirements are prescribed in HNF-MP-013, Configuration Management Plan (FDH 1997a). This TWRS Configuration Management Plan (CMP) implements those requirements and supersedes the Tank Waste Remediation System Configuration Management Program Plan described in Vann, 1996. HNF-SD-WM-CM-014, Tank Waste Remediation System Configuration Management Implementation Plan (Vann, 1997) will be revised to implement the requirements of this plan. This plan provides the responsibilities, actions and tools necessary to implement the requirements as defined in the above referenced documents.« less

  1. Managing Space System Faults: Coalescing NASA's Views

    NASA Technical Reports Server (NTRS)

    Muirhead, Brian; Fesq, Lorraine

    2012-01-01

    Managing faults and their resultant failures is a fundamental and critical part of developing and operating aerospace systems. Yet, recent studies have shown that the engineering "discipline" required to manage faults is not widely recognized nor evenly practiced within the NASA community. Attempts to simply name this discipline in recent years has been fraught with controversy among members of the Integrated Systems Health Management (ISHM), Fault Management (FM), Fault Protection (FP), Hazard Analysis (HA), and Aborts communities. Approaches to managing space system faults typically are unique to each organization, with little commonality in the architectures, processes and practices across the industry.

  2. Recommendation System Based On Association Rules For Distributed E-Learning Management Systems

    NASA Astrophysics Data System (ADS)

    Mihai, Gabroveanu

    2015-09-01

    Traditional Learning Management Systems are installed on a single server where learning materials and user data are kept. To increase its performance, the Learning Management System can be installed on multiple servers; learning materials and user data could be distributed across these servers obtaining a Distributed Learning Management System. In this paper is proposed the prototype of a recommendation system based on association rules for Distributed Learning Management System. Information from LMS databases is analyzed using distributed data mining algorithms in order to extract the association rules. Then the extracted rules are used as inference rules to provide personalized recommendations. The quality of provided recommendations is improved because the rules used to make the inferences are more accurate, since these rules aggregate knowledge from all e-Learning systems included in Distributed Learning Management System.

  3. 48 CFR 245.105 - Contractors' property management system compliance.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... management system compliance. 245.105 Section 245.105 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACT MANAGEMENT GOVERNMENT PROPERTY General 245.105 Contractors' property management system compliance. (a) Definitions— (1) Acceptable property management system...

  4. Environmental Management Systems

    EPA Pesticide Factsheets

    This site on Environmental Management Systems (EMS) provides information and resources related to EMS for small businesses and private industry, as well as local, state and federal agencies, including all the EPA offices and laboratories.

  5. Operable Data Management for Ocean Observing Systems

    NASA Astrophysics Data System (ADS)

    Chavez, F. P.; Graybeal, J. B.; Godin, M. A.

    2004-12-01

    As oceanographic observing systems become more numerous and complex, data management solutions must follow. Most existing oceanographic data management systems fall into one of three categories: they have been developed as dedicated solutions, with limited application to other observing systems; they expect that data will be pre-processed into well-defined formats, such as netCDF; or they are conceived as robust, generic data management solutions, with complexity (high) and maturity and adoption rates (low) to match. Each approach has strengths and weaknesses; no approach yet fully addresses, nor takes advantage of, the sophistication of ocean observing systems as they are now conceived. In this presentation we describe critical data management requirements for advanced ocean observing systems, of the type envisioned by ORION and IOOS. By defining common requirements -- functional, qualitative, and programmatic -- for all such ocean observing systems, the performance and nature of the general data management solution can be characterized. Issues such as scalability, maintaining metadata relationships, data access security, visualization, and operational flexibility suggest baseline architectural characteristics, which may in turn lead to reusable components and approaches. Interoperability with other data management systems, with standards-based solutions in metadata specification and data transport protocols, and with the data management infrastructure envisioned by IOOS and ORION, can also be used to define necessary capabilities. Finally, some requirements for the software infrastructure of ocean observing systems can be inferred. Early operational results and lessons learned, from development and operations of MBARI ocean observing systems, are used to illustrate key requirements, choices, and challenges. Reference systems include the Monterey Ocean Observing System (MOOS), its component software systems (Software Infrastructure and Applications for MOOS, and

  6. Lesbian Teachers' Identity, Power and the Public/Private Boundary

    ERIC Educational Resources Information Center

    Rudoe, Naomi

    2010-01-01

    This article examines lesbian teachers' negotiation of the public/private boundary in the school, focusing on identity management in the context of the heterosexualised space of this public institution. The study is based on interviews conducted with six lesbian teachers working in London secondary schools. I examine the teachers' responses, and…

  7. The CMS Data Management System

    NASA Astrophysics Data System (ADS)

    Giffels, M.; Guo, Y.; Kuznetsov, V.; Magini, N.; Wildish, T.

    2014-06-01

    The data management elements in CMS are scalable, modular, and designed to work together. The main components are PhEDEx, the data transfer and location system; the Data Booking Service (DBS), a metadata catalog; and the Data Aggregation Service (DAS), designed to aggregate views and provide them to users and services. Tens of thousands of samples have been cataloged and petabytes of data have been moved since the run began. The modular system has allowed the optimal use of appropriate underlying technologies. In this contribution we will discuss the use of both Oracle and NoSQL databases to implement the data management elements as well as the individual architectures chosen. We will discuss how the data management system functioned during the first run, and what improvements are planned in preparation for 2015.

  8. Transportation infrastructure : states' implementation of transportation management systems

    DOT National Transportation Integrated Search

    1997-01-13

    This report focuses on the U.S. General Accounting Office's ISTEA update of the states' implementation of pavement management systems, bridges, highway safety, congestion management systems, public transportation, and intermodal management systems. A...

  9. Personal Identity in Italy

    ERIC Educational Resources Information Center

    Crocetti, Elisabetta; Rabaglietti, Emanuela; Sica, Luigia Simona

    2012-01-01

    This chapter discusses specifics of identity formation in Italian adolescents and emerging adults. We review consistent evidence illustrating that, in Italy, a progressive deferral of transition to adulthood strongly impacts youth identity development by stimulating identity exploration and postponement of identity commitments. We also consider…

  10. School Management Information Systems in Primary Schools

    ERIC Educational Resources Information Center

    Demir, Kamile

    2006-01-01

    Developments in information technologies have been impacting upon educational organizations. Principals have been using management information systems to improve the efficiency of administrative services. The aim of this research is to explore principals' perceptions about management information systems and how school management information…

  11. Educational Management Information Systems: Progress and Prospectives.

    ERIC Educational Resources Information Center

    Evans, John A.

    An educational management information system is a network of communication channels, information sources, computer storage and retrieval devices, and processing routines that provide data to educational managers at different levels, places, and times to facilitate decisionmaking. Management information systems should be differentiated from…

  12. ENVIRONMENTAL SYSTEMS MANAGEMENT: TOWARDS A NEW SCIENCE OF SUSTAINABLE ENVIRONMENTAL MANAGEMENT

    EPA Science Inventory

    Environmental Systems Management (ESM) is the management of environmental problems at the systems level fully accounting for the multi-dimensional nature of the environment. This includes socio-economic dimensions as well as the usual physical and life science aspects of environm...

  13. 5 CFR 430.304 - SES performance management systems.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 1 2011-01-01 2011-01-01 false SES performance management systems. 430.304 Section 430.304 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PERFORMANCE MANAGEMENT Managing Senior Executive Performance § 430.304 SES performance management systems. (a...

  14. ‘Stealing me from myself’: identity and recovery in personal accounts of mental illness

    PubMed Central

    Bruce, Kevin; Saedi, Goal Auzeen; Weis, Teresa; Green, Carla A.

    2013-01-01

    Objectives To understand and promote recovery from serious mental illnesses, it is important to study the perspectives of individuals who are coping with mental health problems. The aim of the present study was to examine identity-related themes in published self-narratives of family members and individuals with serious mental illness. It adds to the body of research addressing how identity affects the process of recovery and identifies potential opportunities for using published narratives to support individuals as they move toward positive identities that facilitate recovery. Method Forty-five personal accounts from individuals with severe mental illness, which were published in two prominent research journals between 1998 and 2003, were qualitatively analysed. Results Individuals with mental illness and their family members described a loss of self and identity that had to be overcome, or at least managed, for recovery to become possible. Writers described (i) a loss of self, (ii) the duality of (ill/well) selves, (iii) perceptions of normality, (iv) specific concerns about parenting and identity, and (v) hope and reconciliation. Conclusions Individuals’ stories of their experiences of severe mental illness describe severe challenges managing identity. Efforts to publish personal accounts that focus on strengths-based patient-centred stories, rather than on deficits, could be helpful to provide hope for patients. These published narratives highlight the importance of moving recovery and hope to the forefront among patient, family, and clinician groups. Increasing such information and role models can provide important resources to individuals working to redefine themselves and create a sense of self-worth and stable identity that will support productive, happy lives. PMID:18465375

  15. A high reliability battery management system

    NASA Technical Reports Server (NTRS)

    Moody, M. H.

    1986-01-01

    Over a period of some 5 years Canadian Astronautics Limited (CAL) has developed a system to autonomously manage, and thus prolong the life of, secondary storage batteries. During the development, the system was aimed at the space vehicle application using nickel cadmium batteries, but is expected to be able to enhance the life and performance of any rechargeable electrochemical couple. The system handles the cells of a battery individually and thus avoids the problems of over, and under, drive that inevitably occur in a battery of cells managed by an averaging system. This individual handling also allow cells to be totally bypassed in the event of failure, thus avoiding the losses associated with low capacity, partial short circuit, and the catastrophe of open circuit. The system has an optional capability of managing redundant batteries simultaneously, adding the advantage of on line reconditioning of one battery, while the other maintains the energy storage capability of the overall system. As developed, the system contains a dedicated, redundant, microprocessor, but the capability exists to have this computing capability time shared, or remote, and operating through a data link. As adjuncts to the basic management system CAL has developed high efficiency, polyphase, power regulators for charge and discharge power conditioning.

  16. Security in the management of information systems.

    PubMed

    Huston, T L; Huston, J L

    1998-06-01

    Although security technology exists in abundance in health information management systems, the implementation of that technology is often lacking. This lack of implementation can be heavily affected by the attitudes and perceptions of users and management, the "people part" of systems. Particular operational, organizational, and economic factors must be addressed along with employment of security objectives and accountability. Unique threats, as well as controls, pervade the use of microcomputer-based systems as these systems permeate health care information management.

  17. 23 CFR 973.204 - Management systems requirements.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL LANDS HIGHWAYS MANAGEMENT... system; (2) A process to operate and maintain the management systems and their associated databases; (3... systems shall use databases with a common or coordinated reference system that can be used to geolocate...

  18. 23 CFR 973.204 - Management systems requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL LANDS HIGHWAYS MANAGEMENT... system; (2) A process to operate and maintain the management systems and their associated databases; (3... systems shall use databases with a common or coordinated reference system that can be used to geolocate...

  19. 12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED...) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity... soundness of the financial institution or creditor from identity theft, including financial, operational...

  20. 12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED...) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity... soundness of the financial institution or creditor from identity theft, including financial, operational...

  1. OXC management and control system architecture with scalability, maintenance, and distributed managing environment

    NASA Astrophysics Data System (ADS)

    Park, Soomyung; Joo, Seong-Soon; Yae, Byung-Ho; Lee, Jong-Hyun

    2002-07-01

    In this paper, we present the Optical Cross-Connect (OXC) Management Control System Architecture, which has the scalability and robust maintenance and provides the distributed managing environment in the optical transport network. The OXC system we are developing, which is divided into the hardware and the internal and external software for the OXC system, is made up the OXC subsystem with the Optical Transport Network (OTN) sub layers-hardware and the optical switch control system, the signaling control protocol subsystem performing the User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) signaling control, the Operation Administration Maintenance & Provisioning (OAM&P) subsystem, and the network management subsystem. And the OXC management control system has the features that can support the flexible expansion of the optical transport network, provide the connectivity to heterogeneous external network elements, be added or deleted without interrupting OAM&P services, be remotely operated, provide the global view and detail information for network planner and operator, and have Common Object Request Broker Architecture (CORBA) based the open system architecture adding and deleting the intelligent service networking functions easily in future. To meet these considerations, we adopt the object oriented development method in the whole developing steps of the system analysis, design, and implementation to build the OXC management control system with the scalability, the maintenance, and the distributed managing environment. As a consequently, the componentification for the OXC operation management functions of each subsystem makes the robust maintenance, and increases code reusability. Also, the component based OXC management control system architecture will have the flexibility and scalability in nature.

  2. Theorizing Teacher Identity: Self-Narratives and Finding Place in an Audit Society

    ERIC Educational Resources Information Center

    Bullough, Robert V., Jr.

    2015-01-01

    Noting the need for richer theories of identity and identity formation in education, the author describes aspects of D. P. McAdams' psychosocial constructivist framework enriched by select concepts drawn from Life Course research for conceptualizing and analyzing identity development within audit-driven societies and educational systems. Drawing…

  3. Talkin' Musical Identities Blues

    ERIC Educational Resources Information Center

    Lamb, Roberta

    2004-01-01

    After reading the book "Musical Identities" (Raymond MacDonald, David Hargreaves, Dorothy Miell, eds.; Oxford and New York: Oxford University Press, 2002), this author states she finds it difficult to separate "identities in music" from "music in identities." In fact, she cannot conceive of music apart from identity.…

  4. Spatial separation and entanglement of identical particles

    NASA Astrophysics Data System (ADS)

    Cunden, Fabio Deelan; di Martino, Sara; Facchi, Paolo; Florio, Giuseppe

    2014-04-01

    We reconsider the effect of indistinguishability on the reduced density operator of the internal degrees of freedom (tracing out the spatial degrees of freedom) for a quantum system composed of identical particles located in different spatial regions. We explicitly show that if the spin measurements are performed in disjoint spatial regions then there are no constraints on the structure of the reduced state of the system. This implies that the statistics of identical particles has no role from the point of view of separability and entanglement when the measurements are spatially separated. We extend the treatment to the case of n particles and show the connection with some recent criteria for separability based on subalgebras of observables.

  5. Human identity versus gender identity: The perception of sexual addiction among Iranian women.

    PubMed

    Moshtagh, Mozhgan; Mirlashari, Jila; Rafiey, Hassan; Azin, Ali; Farnam, Robert

    2017-07-01

    This qualitative study was conducted to explore the images of personal identity from the perspective of women with sexual addiction. The data required for the study were collected through 31 in-depth interviews. Sensing a threat to personal identity, dissatisfaction with gender identity, dissociation with the continuum of identity, and identity reconstruction in response to threat were four of the experiences that were common among women with sexual addiction. Painful emotional experiences appear to have created a sense of gender and sexual conflict or weakness in these women and thus threatened their personal identity and led to their sexual addiction.

  6. A new specimen management system using RFID technology.

    PubMed

    Shim, Hun; Uh, Young; Lee, Seung Hwan; Yoon, Young Ro

    2011-12-01

    The specimen management system with barcode needs to be improved in order to solve inherent problems in work performance. This study describes the application of Radio Frequency Identification (RFID) which is the solution for the problems associated with specimen labeling and management. A new specimen management system and architecture with RFID technology for clinical laboratory was designed. The suggested system was tested in various conditions such as durability to temperature and aspect of effective utilization of new work flow under a virtual hospital clinical laboratory environment. This system demonstrates its potential application in clinical laboratories for improving work flow and specimen management. The suggested specimen management system with RFID technology has advantages in comparison to the traditional specimen management system with barcode in the aspect of mass specimen processing, robust durability of temperature, humidity changes, and effective specimen tracking.

  7. Adaptive management of rangeland systems

    USGS Publications Warehouse

    Allen, Craig R.; Angeler, David G.; Fontaine, Joseph J.; Garmestani, Ahjond S.; Hart, Noelle M.; Pope, Kevin L.; Twidwell, Dirac

    2017-01-01

    Adaptive management is an approach to natural resource management that uses structured learning to reduce uncertainties for the improvement of management over time. The origins of adaptive management are linked to ideas of resilience theory and complex systems. Rangeland management is particularly well suited for the application of adaptive management, having sufficient controllability and reducible uncertainties. Adaptive management applies the tools of structured decision making and requires monitoring, evaluation, and adjustment of management. Adaptive governance, involving sharing of power and knowledge among relevant stakeholders, is often required to address conflict situations. Natural resource laws and regulations can present a barrier to adaptive management when requirements for legal certainty are met with environmental uncertainty. However, adaptive management is possible, as illustrated by two cases presented in this chapter. Despite challenges and limitations, when applied appropriately adaptive management leads to improved management through structured learning, and rangeland management is an area in which adaptive management shows promise and should be further explored.

  8. A Management Information System Model for Program Management. Ph.D. Thesis - Oklahoma State Univ.; [Computerized Systems Analysis

    NASA Technical Reports Server (NTRS)

    Shipman, D. L.

    1972-01-01

    The development of a model to simulate the information system of a program management type of organization is reported. The model statistically determines the following parameters: type of messages, destinations, delivery durations, type processing, processing durations, communication channels, outgoing messages, and priorites. The total management information system of the program management organization is considered, including formal and informal information flows and both facilities and equipment. The model is written in General Purpose System Simulation 2 computer programming language for use on the Univac 1108, Executive 8 computer. The model is simulated on a daily basis and collects queue and resource utilization statistics for each decision point. The statistics are then used by management to evaluate proposed resource allocations, to evaluate proposed changes to the system, and to identify potential problem areas. The model employs both empirical and theoretical distributions which are adjusted to simulate the information flow being studied.

  9. Identities in Harmony: Gender-Work Identity Integration Moderates Frame Switching in Cognitive Processing

    ERIC Educational Resources Information Center

    Sacharin, Vera; Lee, Fiona; Gonzalez, Richard

    2009-01-01

    Professional women's identity integration--the perceived compatibility between work and gender identities--plays a role in how task or relationship information is processed. Seventy female business school students were primed with either their professional or their gender identity. Business women with higher identity integration showed an…

  10. Performance Information Management System (PIMS) Communication

    DTIC Science & Technology

    1993-12-31

    34AD-A284 851 AD MIPR NO. MIPR 92MM2501 TITLE: Performance Information Management System (PIMS) Communication PRINCIPAL INVESTIGATOR: Kathryn P...93 . . ..- F •nal,. 12/1/91 - 12/31/93- ...... . ..... PIMS-Performance Information Management System Communications 92MM2501 Kathryn P. Winter Navy

  11. Air System Information Management

    NASA Technical Reports Server (NTRS)

    Filman, Robert E.

    2004-01-01

    I flew to Washington last week, a trip rich in distributed information management. Buying tickets, at the gate, in flight, landing and at the baggage claim, myriad messages about my reservation, the weather, our flight plans, gates, bags and so forth flew among a variety of travel agency, airline and Federal Aviation Administration (FAA) computers and personnel. By and large, each kind of information ran on a particular application, often specialized to own data formats and communications network. I went to Washington to attend an FAA meeting on System-Wide Information Management (SWIM) for the National Airspace System (NAS) (http://www.nasarchitecture.faa.gov/Tutorials/NAS101.cfm). NAS (and its information infrastructure, SWIM) is an attempt to bring greater regularity, efficiency and uniformity to the collection of stovepipe applications now used to manage air traffic. Current systems hold information about flight plans, flight trajectories, weather, air turbulence, current and forecast weather, radar summaries, hazardous condition warnings, airport and airspace capacity constraints, temporary flight restrictions, and so forth. Information moving among these stovepipe systems is usually mediated by people (for example, air traffic controllers) or single-purpose applications. People, whose intelligence is critical for difficult tasks and unusual circumstances, are not as efficient as computers for tasks that can be automated. Better information sharing can lead to higher system capacity, more efficient utilization and safer operations. Better information sharing through greater automation is possible though not necessarily easy.

  12. Smart energy management system

    NASA Astrophysics Data System (ADS)

    Desai, Aniruddha; Singh, Jugdutt

    2010-04-01

    Peak and average energy usage in domestic and industrial environments is growing rapidly and absence of detailed energy consumption metrics is making systematic reduction of energy usage very difficult. Smart energy management system aims at providing a cost-effective solution for managing soaring energy consumption and its impact on green house gas emissions and climate change. The solution is based on seamless integration of existing wired and wireless communication technologies combined with smart context-aware software which offers a complete solution for automation of energy measurement and device control. The persuasive software presents users with easy-to-assimilate visual cues identifying problem areas and time periods and encourages a behavioural change to conserve energy. The system allows analysis of real-time/statistical consumption data with the ability to drill down into detailed analysis of power consumption, CO2 emissions and cost. The system generates intelligent projections and suggests potential methods (e.g. reducing standby, tuning heating/cooling temperature, etc.) of reducing energy consumption. The user interface is accessible using web enabled devices such as PDAs, PCs, etc. or using SMS, email, and instant messaging. Successful real-world trial of the system has demonstrated the potential to save 20 to 30% energy consumption on an average. Low cost of deployment and the ability to easily manage consumption from various web enabled devices offers gives this system a high penetration and impact capability offering a sustainable solution to act on climate change today.

  13. Database management systems for process safety.

    PubMed

    Early, William F

    2006-03-17

    Several elements of the process safety management regulation (PSM) require tracking and documentation of actions; process hazard analyses, management of change, process safety information, operating procedures, training, contractor safety programs, pre-startup safety reviews, incident investigations, emergency planning, and compliance audits. These elements can result in hundreds of actions annually that require actions. This tracking and documentation commonly is a failing identified in compliance audits, and is difficult to manage through action lists, spreadsheets, or other tools that are comfortably manipulated by plant personnel. This paper discusses the recent implementation of a database management system at a chemical plant and chronicles the improvements accomplished through the introduction of a customized system. The system as implemented modeled the normal plant workflows, and provided simple, recognizable user interfaces for ease of use.

  14. LOGISTIC MANAGEMENT INFORMATION SYSTEM - MANUAL DATA STORAGE AND RETRIEVAL SYSTEM.

    DTIC Science & Technology

    Logistics Management Information System . The procedures are applicable to manual storage and retrieval of all data used in the Logistics Management ... Information System (LMIS) and include the following: (1) Action Officer data source file. (2) Action Officer presentation format file. (3) LMI Coordination

  15. RIMS: Resource Information Management System

    NASA Technical Reports Server (NTRS)

    Symes, J.

    1983-01-01

    An overview is given of the capabilities and functions of the resource management system (RIMS). It is a simple interactive DMS tool which allows users to build, modify, and maintain data management applications. The RIMS minimizes programmer support required to develop/maintain small data base applications. The RIMS also assists in bringing the United Information Services (UIS) budget system work inhouse. Information is also given on the relationship between the RIMS and the user community.

  16. Management system, organizational climate and performance relationships

    NASA Technical Reports Server (NTRS)

    Davis, B. D.

    1979-01-01

    Seven aerospace firms were investigated to determine if a relationship existed among management systems, organizational climate, and organization performance. Positive relationships were found between each of these variables, but a statistically significant relationship existed only between the management system and organizational climate. The direction and amount of communication and the degree of decentralized decision-making, elements of the management system, also had a statistically significant realtionship with organization performance.

  17. A model for international border management systems.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duggan, Ruth Ann

    2008-09-01

    To effectively manage the security or control of its borders, a country must understand its border management activities as a system. Using its systems engineering and security foundations as a Department of Energy National Security Laboratory, Sandia National Laboratories has developed such an approach to modeling and analyzing border management systems. This paper describes the basic model and its elements developed under Laboratory Directed Research and Development project 08-684.

  18. Negotiating Contexts to Construct an Identity as a Mathematics Teacher

    ERIC Educational Resources Information Center

    Hodges, Thomas E.; Cady, Jo Ann

    2012-01-01

    The authors focused on 1 middle-grades mathematics teacher's identity and her efforts to implement standards-based instructional practices. As professionals, teachers participate in multiple professional communities and must negotiate and manage conflicting agendas. The authors analyze how the contexts of these communities influence the teacher's…

  19. 5 CFR 9701.405 - Performance management system requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... requirements. 9701.405 Section 9701.405 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.405 Performance...

  20. 76 FR 14592 - Safety Management System; Withdrawal

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ...-06A] RIN 2120-AJ15 Safety Management System; Withdrawal AGENCY: Federal Aviation Administration (FAA... (``product/ service providers'') to develop a Safety Management System (SMS). The FAA is withdrawing the... management with a set of robust decision-making tools to use to improve safety. The FAA received 89 comments...

  1. Technical Literature Review Concerning Management Information Systems.

    DTIC Science & Technology

    interrelationships of the many aspects of management information systems (MIS); that is, with how analysis, design, operation, evaluation, and user considerations affect management information systems . (Author)

  2. A comprehensive infectious disease management system.

    PubMed

    Marcu, Alex; Farley, John D

    2009-01-01

    An efficient electronic management system is now an essential tool for the successful management and monitoring of those affected by communicable infectious diseases (Human Immunodeficiency Virus - HIV, hepatitis C - HEP C) during the course of the treatment. The current methods which depend heavily on manual collecting, compiling and disseminating treatment information are labor-intensive and time consuming. Clinics specialized in the treatment of infectious diseases use a mix of electronic systems that fail to interact with each other, result in data duplication, and do not support treatment of the patient as a whole. The purpose of the Infectious Disease Management System is to reduce the administrative overhead associated with data collection and analysis while providing correlation abilities and decision support in accordance with defined treatment guidelines. This Infectious Disease Management System was developed to: Ensure cost effectiveness by means of low software licensing costs, Introduce a centralized mechanism of collecting and monitoring all infectious disease management data, Automate electronic retrieval of laboratory findings, Introduce a decision support mechanism as per treatment guidelines, Seamlessly integrate of application modules, Provide comprehensive reporting capabilities, Maintain a high level of user friendliness.

  3. Thinking identity differently: dynamics of identity in self and institutional boundary

    NASA Astrophysics Data System (ADS)

    Albrecht, Nancy J.; Fortney, Brian S.

    2011-03-01

    In research oriented universities, research and teaching are often viewed as separate. Aydeniz and Hodge present one professor's struggles to synthesize an identity from three different spaces, each with competing values and core beliefs. As Mr. G's story unfolds, and he reflects upon his negotiation between teaching and research responsibilities, we seek to expand the discussion by presenting a caution to identity researchers. The caution pertains to construction of understanding on how identities are created, and the role that individual stories take in how identities are created and enacted. In this forum contribution, we present several questions in the hopes of furthering the discussion on identity research, and our understanding of the conceptualization of institutional boundaries and objectivity, as well as questions on participant involvement in the process of research.

  4. Respiratory care management information systems.

    PubMed

    Ford, Richard M

    2004-04-01

    Hospital-wide computerized information systems evolved from the need to capture patient information and perform billing and other financial functions. These systems, however, have fallen short of meeting the needs of respiratory care departments regarding work load assessment, productivity management, and the level of outcome reporting required to support programs such as patient-driven protocols. The respiratory care management information systems (RCMIS) of today offer many advantages over paper-based systems and hospital-wide computer systems. RCMIS are designed to facilitate functions specific to respiratory care, including assessing work demand, assigning and tracking resources, charting, billing, and reporting results. RCMIS incorporate mobile, point-of-care charting and are highly configurable to meet the specific needs of individual respiratory care departments. Important and substantial benefits can be realized with an RCMIS and mobile, wireless charting devices. The initial and ongoing costs of an RCMIS are justified by increased charge capture and reduced costs, by way of improved productivity and efficiency. It is not unusual to recover the total cost of an RCMIS within the first year of its operation. In addition, such systems can facilitate and monitor patient-care protocols and help to efficiently manage the vast amounts of information encountered during the practitioner's workday. Respiratory care departments that invest in RCMIS have an advantage in the provision of quality care and in reducing expenses. A centralized respiratory therapy department with an RCMIS is the most efficient and cost-effective way to monitor work demand and manage the hospital-wide allocation of respiratory care services.

  5. Region 7 Laboratory Information Management System

    EPA Pesticide Factsheets

    This is metadata documentation for the Region 7 Laboratory Information Management System (R7LIMS) which maintains records for the Regional Laboratory. Any Laboratory analytical work performed is stored in this system which replaces LIMS-Lite, and before that LAST. The EPA and its contractors may use this database. The Office of Policy & Management (PLMG) Division at EPA Region 7 is the primary managing entity; contractors can access this database but it is not accessible to the public.

  6. Study of Intelligent Secure Chemical Inventory Management System

    NASA Astrophysics Data System (ADS)

    Shukran, Mohd Afizi Mohd; Naim Abdullah, Muhammad; Nazri Ismail, Mohd; Maskat, Kamaruzaman; Isa, Mohd Rizal Mohd; Shahfee Ishak, Muhammad; Adib Khairuddin, Muhamad

    2017-08-01

    Chemical inventory management system has been experiencing a new revolution from traditional inventory system which is manual to an automated inventory management system. In this paper, some review of the classic and modern approaches to chemical inventory management system has been discussed. This paper also describe about both type of inventory management. After a comparative analysis of the traditional method and automated method, it can be said that both methods have some distinctive characteristics. Moreover, the automated inventory management method has higher accuracy of calculation because the calculations are handled by software, eliminating possible errors and saving time. The automated inventory system also allows users and administrators to track the availability, location and consumption of chemicals. The study of this paper can provide forceful review analysis support for the chemical inventory management related research.

  7. Social Identity in People with Multiple Sclerosis: An Examination of Family Identity and Mood.

    PubMed

    Barker, Alex B; Lincoln, Nadina B; Hunt, Nigel; dasNair, Roshan

    2018-01-01

    Mood disorders are highly prevalent in people with multiple sclerosis (MS). MS causes changes to a person's sense of self. The Social Identity Model of Identity Change posits that group membership can have a positive effect on mood during identity change. The family is a social group implicated in adjustment to MS. The objectives of this study were to investigate whether family identity can predict mood in people with MS and to test whether this prediction was mediated by social support and connectedness to others. This cross-sectional survey of 195 participants comprised measures of family identity, family social support, connectedness to others, and mood. Family identity predicted mood both directly and indirectly through parallel mediators of family social support and connectedness to others. Family identity predicted mood as posited by the Social Identity Model of Identity Change. Involving the family in adjustment to MS could reduce low mood.

  8. Entanglement by Path Identity.

    PubMed

    Krenn, Mario; Hochrainer, Armin; Lahiri, Mayukh; Zeilinger, Anton

    2017-02-24

    Quantum entanglement is one of the most prominent features of quantum mechanics and forms the basis of quantum information technologies. Here we present a novel method for the creation of quantum entanglement in multipartite and high-dimensional systems. The two ingredients are (i) superposition of photon pairs with different origins and (ii) aligning photons such that their paths are identical. We explain the experimentally feasible creation of various classes of multiphoton entanglement encoded in polarization as well as in high-dimensional Hilbert spaces-starting only from nonentangled photon pairs. For two photons, arbitrary high-dimensional entanglement can be created. The idea of generating entanglement by path identity could also apply to quantum entities other than photons. We discovered the technique by analyzing the output of a computer algorithm. This shows that computer designed quantum experiments can be inspirations for new techniques.

  9. Entanglement by Path Identity

    NASA Astrophysics Data System (ADS)

    Krenn, Mario; Hochrainer, Armin; Lahiri, Mayukh; Zeilinger, Anton

    2017-02-01

    Quantum entanglement is one of the most prominent features of quantum mechanics and forms the basis of quantum information technologies. Here we present a novel method for the creation of quantum entanglement in multipartite and high-dimensional systems. The two ingredients are (i) superposition of photon pairs with different origins and (ii) aligning photons such that their paths are identical. We explain the experimentally feasible creation of various classes of multiphoton entanglement encoded in polarization as well as in high-dimensional Hilbert spaces—starting only from nonentangled photon pairs. For two photons, arbitrary high-dimensional entanglement can be created. The idea of generating entanglement by path identity could also apply to quantum entities other than photons. We discovered the technique by analyzing the output of a computer algorithm. This shows that computer designed quantum experiments can be inspirations for new techniques.

  10. Narrating and Performing Identity: Literacy Specialists' Writing Identities

    ERIC Educational Resources Information Center

    McKinney, Marilyn; Giorgis, Cyndi

    2009-01-01

    In this study, we explored ways that four literacy specialists who worked in three schools that were part of one state's Reading Excellence Act (REA) grant constructed their identities as writers and as teachers of writing. We also explored how they negotiated the performance of those identities in different contexts over a two-year period.…

  11. 44 CFR 13.20 - Standards for financial management systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... management systems. 13.20 Section 13.20 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT... Standards for financial management systems. (a) A State must expand and account for grant funds in... financial management systems of other grantees and subgrantees must meet the following standards: (1...

  12. Social Identity and Preferences*

    PubMed Central

    Benjamin, Daniel J.; Choi, James J.; Strickland, A. Joshua

    2009-01-01

    Social identities prescribe behaviors for people. We identify the marginal behavioral effect of these norms on discount rates and risk aversion by measuring how laboratory subjects’ choices change when an aspect of social identity is made salient. When we make ethnic identity salient to Asian-American subjects, they make more patient choices. When we make racial identity salient to black subjects, non-immigrant blacks (but not immigrant blacks) make more patient choices. Making gender identity salient has no effect on intertemporal or risk choices. PMID:20871741

  13. Professional Identity, Adaptation and the Self: Cases of New Zealand School Principals during a Time of Change

    ERIC Educational Resources Information Center

    Notman, Ross

    2017-01-01

    There is developing interest in how professional identity can support educational leaders' management of change. This article explores the conceptualisation and interplay of identity formation with adaptive and contingent forms of educational leadership. The article draws on qualitative data obtained from two New Zealand school principals and…

  14. Memory transfer for emotionally valenced words between identities in dissociative identity disorder.

    PubMed

    Huntjens, Rafaële J C; Peters, Madelon L; Woertman, Liesbeth; van der Hart, Onno; Postma, Albert

    2007-04-01

    The present study aimed to determine interidentity retrieval of emotionally valenced words in dissociative identity disorder (DID). Twenty-two DID patients participated together with 25 normal controls and 25 controls instructed to simulate DID. Two wordlists A and B were constructed including neutral, positive and negative material. List A was shown to one identity, while list B was shown to another identity claiming total amnesia for the words learned by the first identity. The identity claiming amnesia was tested for intrusions from list A words into the recall of words from list B and recognition of the words learned by both identities. Test results indicated no evidence of total interidentity amnesia for emotionally valenced material in DID. It is argued that dissociative amnesia in DID may more adequately be described as a disturbance in meta-memory functioning instead of an actual retrieval inability.

  15. Family physicians' professional identity formation: a study protocol to explore impression management processes in institutional academic contexts.

    PubMed

    Rodríguez, Charo; Pawlikowska, Teresa; Schweyer, Francois-Xavier; López-Roig, Sofia; Bélanger, Emmanuelle; Burns, Jane; Hugé, Sandrine; Pastor-Mira, Maria Ángeles; Tellier, Pierre-Paul; Spencer, Sarah; Fiquet, Laure; Pereiró-Berenguer, Inmaculada

    2014-09-06

    Despite significant differences in terms of medical training and health care context, the phenomenon of medical students' declining interest in family medicine has been well documented in North America and in many other developed countries as well. As part of a research program on family physicians' professional identity formation initiated in 2007, the purpose of the present investigation is to examine in-depth how family physicians construct their professional image in academic contexts; in other words, this study will allow us to identify and understand the processes whereby family physicians with an academic appointment seek to control the ideas others form about them as a professional group, i.e. impression management. The methodology consists of a multiple case study embedded in the perspective of institutional theory. Four international cases from Canada, France, Ireland and Spain will be conducted; the "case" is the medical school. Four levels of analysis will be considered: individual family physicians, interpersonal relationships, family physician professional group, and organization (medical school). Individual interviews and focus groups with academic family physicians will constitute the main technique for data generation, which will be complemented with a variety of documentary sources. Discourse techniques, more particularly rhetorical analysis, will be used to analyze the data gathered. Within- and cross-case analysis will then be performed. This empirical study is strongly grounded in theory and will contribute to the scant body of literature on family physicians' professional identity formation processes in medical schools. Findings will potentially have important implications for the practice of family medicine, medical education and health and educational policies.

  16. 78 FR 14297 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ... name, address, phone number, birth date, and Social Security Number (SSN).'' Authority for maintenance... storage media.'' * * * * * System manager(s) and address: Delete entry and replace with ``Chief of... signature as a means of proving the identity of the individual requesting access to the records.'' Record...

  17. Gender Identity and Career Aspiration to Top Management of Malaysian Graduate Students

    ERIC Educational Resources Information Center

    Karami, Roya; Ismail, Maimunah; Sail, Rahim Md.

    2011-01-01

    This article examines the relationship between gender identity and career aspirations of a group of Iranian international postgraduate students studying at a Malaysian public university. This study uses the Farmer's Achievement Motivation Theory and Astin's Sociopsychological Model of Career Choice as theoretical framework. The data were collected…

  18. 46 CFR 16.500 - Management Information System requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Management Information System requirements. 16.500 Section 16.500 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING Management Information System § 16.500 Management Information System requirements. (a...

  19. 46 CFR 16.500 - Management Information System requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 1 2013-10-01 2013-10-01 false Management Information System requirements. 16.500 Section 16.500 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING Management Information System § 16.500 Management Information System requirements. (a...

  20. 46 CFR 16.500 - Management Information System requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Management Information System requirements. 16.500 Section 16.500 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING Management Information System § 16.500 Management Information System requirements. (a...